Equifax Breach Settlement

According to the FCC’s website (https://www.ftc.gov/enforcement/cases-proceedings/refunds/equifax-data-breach-settlement), a settlement has been reached in the Equifax data breach reported in September 2017 which affected 147 million people. The initial reports stated individuals could file for a $125 cash payment or credit monitoring services, but in an article from marketwatch.com (https://www.marketwatch.com/story/sorry-youre-not-getting-125-from-the-equifax-settlement-ftc-says-2019-07-31), the $125 payout has had an enormous response and the payout will most likely be less than $125 per person.

What is your next step?  First visit the Equifax Data Breach Settlement page (https://www.equifaxbreachsettlement.com/) and see if your information was part of the breach.  Click the “FIND OUT IF YOUR INFORMATION WAS IMPACTED” button.  Enter your last name and last 6-digits of your Social Security Number and the page will report if your information was contained in the breach.

So your information was part of the breach, what do you do now?  Credit monitoring services are available through Experian and Equifax.  You may also be able to claim reimbursement for the time you spent dealing with misuse of your personal information caused by the data breach.  Visit the Equifax Data Breach Settlement page https://www.equifaxbreachsettlement.com/ for more details.

Sources and more information:
FTC
https://www.ftc.gov/enforcement/cases-proceedings/refunds/equifax-data-breach-settlement

MarketWatch.com
https://www.marketwatch.com/story/sorry-youre-not-getting-125-from-the-equifax-settlement-ftc-says-2019-07-31

Equifax Data Breach Settlement page
https://www.equifaxbreachsettlement.com/

Ready to have a conversation?

We would really love to hear from you! Give us a call at 608-563-1975 or fill out the form below to start working with our team.

Fill out my online form.

How to Build a Security-First Culture That Empowers Your Hybrid Workforce
Tools are only as good as their users. This should be your …
Top 9 IoT-Related Security Threats Businesses Face
The Internet of Things (IoT) is rapidly changing the technology landscape as …
All You Need to Know About Least Privilege
In IT, the principle of least privilege (PoLP) refers to the concept …
Kaseya VSA Ransomware attack
We at ITNS Consulting would like to commend Kaseya for their amazing …
Your Biggest Cybersecurity Risk: Your Untrained Employees
Cybercriminals work round the clock to detect and exploit vulnerabilities in your …
Best Practices for a Secure Supply Chain
Your business’ cybersecurity posture must prioritize detection, evaluation and mitigation of risks …
How to Effectively Manage Supply Chain Risks
Digital transformation has made many things easier for businesses, right from inventory …
Ransomware: Cybersecurity’s Biggest Bully Yet
Can you imagine logging into your system to access your business data …