Equifax data breach... get free monitoring

The #1 community for Gun Owners in Indiana

Member Benefits:

  • Fewer Ads!
  • Discuss all aspects of firearm ownership
  • Discuss anti-gun legislation
  • Buy, sell, and trade in the classified section
  • Chat with Local gun shops, ranges, trainers & other businesses
  • Discover free outdoor shooting areas
  • View up to date on firearm-related events
  • Share photos & video with other members
  • ...and so much more!
  • jkaetz

    Master
    Rating - 100%
    3   0   0
    Jan 20, 2009
    1,965
    83
    Indianapolis
    An inquiry indicated that the wife and I both "may have been" compromised and gave us a date to sign up for the free protection. Mentioned it to a friend who said when you sign up you also waive your right to sue Equifax. I think I'd rather be safe than reserve the right to sue them after I go through an ID theft issue.....AGAIN. Been there. It was ugly even though we didn't actually lose a penny.
    This debate will rage on, but even if that clause does exist, it will be very difficult to defend in court. I'm sure it will be no more effective than the stickers on dump trucks claiming they are not responsible for broken windshields.
     

    KLB

    Grandmaster
    Rating - 100%
    5   0   0
    Sep 12, 2011
    23,300
    77
    Porter County
    This debate will rage on, but even if that clause does exist, it will be very difficult to defend in court. I'm sure it will be no more effective than the stickers on dump trucks claiming they are not responsible for broken windshields.
    There is a big difference between those two. One you actually have to agree to, the other you had no such option.
     

    jkaetz

    Master
    Rating - 100%
    3   0   0
    Jan 20, 2009
    1,965
    83
    Indianapolis
    There is a big difference between those two. One you actually have to agree to, the other you had no such option.
    True, but it seems that they never intended to try and absolve themselves. The below was posted yesterday on the equifaxsecurity site's front page. This seems pretty clear that the interpretations of some internet lawyers were incorrect.

    3) More details on consumer exemption from arbitration clause.
    Questions continue to be raised about the arbitration clause and class action waiver language that was originally in the terms of use for the free credit file monitoring and identity theft protection products that we are offering called TrustedID Premier. We have removed that language from the TrustedID Premier Terms of Use and it will not apply to the free products offered in response to the cybersecurity incident or for claims related to the cybersecurity incident itself. The arbitration language will not apply to any consumer who signed up before the language was removed.
     

    KittySlayer

    Grandmaster
    Rating - 100%
    4   0   0
    Jan 29, 2013
    6,474
    77
    Northeast IN
    This debate will rage on, but even if that clause does exist, it will be very difficult to defend in court. I'm sure it will be no more effective than the stickers on dump trucks claiming they are not responsible for broken windshields.

    It is not as though any settlements or reimbursements from Equifax are going to be first come, first served. There is not a big enough pile of money to fix what they allowed to happen by the evil hacker scumbags. Even if you win, what you get wont even cover the cost of your inconvenience trying to protect yourself and will come nowhere close to covering the cost if you get your identity stolen.

    As someone noted, the theft already occurred. The bad guys have the information they need and no rush to use it. Your data floating around is just as dangerous today as it is next month and two years from now. The Genie is out of the bottle.
     

    jkaetz

    Master
    Rating - 100%
    3   0   0
    Jan 20, 2009
    1,965
    83
    Indianapolis
    It is not as though any settlements or reimbursements from Equifax are going to be first come, first served. There is not a big enough pile of money to fix what they allowed to happen by the evil hacker scumbags. Even if you win, what you get wont even cover the cost of your inconvenience trying to protect yourself and will come nowhere close to covering the cost if you get your identity stolen.

    As someone noted, the theft already occurred. The bad guys have the information they need and no rush to use it. Your data floating around is just as dangerous today as it is next month and two years from now. The Genie is out of the bottle.
    Completely agreed. The credit monitoring should be lifetime and the credit freeze fees should be paid for by equifax if the can't get the other two agencies to waive the fees for those impacted.
     

    LockStocksAndBarrel

    Grandmaster
    Site Supporter
    Rating - 100%
    10   0   0

    WebSnyper

    Time to make the chimichangas
    Rating - 100%
    59   0   0
    Jul 3, 2010
    15,778
    113
    127.0.0.1
    CSO is not a technical position. It is more of a bureaucratic position. Most people in IT leadership I have known have not had degrees in anything IT related.

    That said, it still would not surprise me on the diversity hire thing. See it all the time in the large organizations I have been in.
     

    jkaetz

    Master
    Rating - 100%
    3   0   0
    Jan 20, 2009
    1,965
    83
    Indianapolis
    The CISO/CIO would not have had anything to do with this leak anyway. This leak was likely the result of a very common IT problem:

    Systems need to be kept up to date at a very low level.
    This is often a mundane and tedious task relegated to the lower levels of the IT staff.
    Even when automated someone must monitor the automation to ensure that it worked correctly.

    I predict that one of two things happened.
    The updates were automated but the monkey supposed to be monitoring wasn't watching. (This gets my personal vote)
    There were not enough staff members to do the updates or the updates were not prioritized over other things.


    Too often I've seen higher ups scream "OMG this needs to be secured now!" but they don't put any more staff effort into security and expect that other projects continue at their current pace. The staff is left to prioritize on their own and often choose the projects that have high visibility. Stakeholders watching those projects don't like to hear that their project was delayed while things were patched. Showing value in patching is difficult since you're essentially trying to prove a negative "I patched/updated the systems and nothing happened." as often times not patching will also yield the same result, nothing happened. It is only when something like this does happen that people start to take notice. Sadly the impact of this will have far reaching consequences for the company as well as about half the US population.
     

    ArcadiaGP

    Wanderer
    Site Supporter
    Rating - 100%
    11   0   0
    Jun 15, 2009
    31,726
    113
    Indianapolis
    The CISO/CIO would not have had anything to do with this leak anyway. This leak was likely the result of a very common IT problem:

    Systems need to be kept up to date at a very low level.
    This is often a mundane and tedious task relegated to the lower levels of the IT staff.
    Even when automated someone must monitor the automation to ensure that it worked correctly.

    I predict that one of two things happened.
    The updates were automated but the monkey supposed to be monitoring wasn't watching. (This gets my personal vote)
    There were not enough staff members to do the updates or the updates were not prioritized over other things.


    Too often I've seen higher ups scream "OMG this needs to be secured now!" but they don't put any more staff effort into security and expect that other projects continue at their current pace. The staff is left to prioritize on their own and often choose the projects that have high visibility. Those watching those projects don't like to hear that their project was delayed while things were patched. Showing value in patching is difficult since you're essentially trying to prove a negative "I patched/updated the systems and nothing happened." as often times not patching will also yield the same result, nothing happened. It is only when something like this does happen that people start to take notice. Sadly the impact of this will have far reaching consequences for the company as well as about half the US population.

    Keeping default passwords doesn't help.

    Equifax had 'admin' as login and password in Argentina - BBC News
     

    WebSnyper

    Time to make the chimichangas
    Rating - 100%
    59   0   0
    Jul 3, 2010
    15,778
    113
    127.0.0.1
    The CISO/CIO would not have had anything to do with this leak anyway. This leak was likely the result of a very common IT problem:

    Systems need to be kept up to date at a very low level.
    This is often a mundane and tedious task relegated to the lower levels of the IT staff.
    Even when automated someone must monitor the automation to ensure that it worked correctly.

    I predict that one of two things happened.
    The updates were automated but the monkey supposed to be monitoring wasn't watching. (This gets my personal vote)
    There were not enough staff members to do the updates or the updates were not prioritized over other things.


    Too often I've seen higher ups scream "OMG this needs to be secured now!" but they don't put any more staff effort into security and expect that other projects continue at their current pace. The staff is left to prioritize on their own and often choose the projects that have high visibility. Stakeholders watching those projects don't like to hear that their project was delayed while things were patched. Showing value in patching is difficult since you're essentially trying to prove a negative "I patched/updated the systems and nothing happened." as often times not patching will also yield the same result, nothing happened. It is only when something like this does happen that people start to take notice. Sadly the impact of this will have far reaching consequences for the company as well as about half the US population.


    The CISO should be setting the tone for these things... I agree, the folks actually carrying out the patching are at the lower levels of the org, but reporting and dashboarding on patching should be bubbling up, and the CISO is ultimately responsible. Their next CISO will hopefully pay attention. Their current one should be looking for a job. The Execs who dumped stock after the discovery but before making it public should be looking for lawyers.
     
    Last edited:

    KLB

    Grandmaster
    Rating - 100%
    5   0   0
    Sep 12, 2011
    23,300
    77
    Porter County
    The CISO/CIO would not have had anything to do with this leak anyway. This leak was likely the result of a very common IT problem:

    Systems need to be kept up to date at a very low level.
    This is often a mundane and tedious task relegated to the lower levels of the IT staff.
    Even when automated someone must monitor the automation to ensure that it worked correctly.

    I predict that one of two things happened.
    The updates were automated but the monkey supposed to be monitoring wasn't watching. (This gets my personal vote)
    There were not enough staff members to do the updates or the updates were not prioritized over other things.


    Too often I've seen higher ups scream "OMG this needs to be secured now!" but they don't put any more staff effort into security and expect that other projects continue at their current pace. The staff is left to prioritize on their own and often choose the projects that have high visibility. Stakeholders watching those projects don't like to hear that their project was delayed while things were patched. Showing value in patching is difficult since you're essentially trying to prove a negative "I patched/updated the systems and nothing happened." as often times not patching will also yield the same result, nothing happened. It is only when something like this does happen that people start to take notice. Sadly the impact of this will have far reaching consequences for the company as well as about half the US population.
    I doubt that Equifax has a staffing problem in security.

    I would lean more towards social engineering and phishing as the path into their network.

    I wonder when we will learn the details of what happened.
     

    Ericpwp

    Grandmaster
    Rating - 100%
    18   0   0
    Jan 14, 2011
    6,753
    48
    NWI
    If they knew about the breech and sold stock before it was public knowledge, that is insider trading and has nothing to do with security.
     

    ArcadiaGP

    Wanderer
    Site Supporter
    Rating - 100%
    11   0   0
    Jun 15, 2009
    31,726
    113
    Indianapolis
    Careful doing a credit freeze through TransUnion. They're trying to lead people to their service and away from an actual freeze.

    Which... good luck doing anyway... still can't get logged in to do it. Have to use the phone number I guess.
     
    Top Bottom