Preview

Equifax Research Paper

Satisfactory Essays
Open Document
Open Document
646 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Equifax Research Paper
Equifax commonly known as EFX is one of the three biggest consumer retail credit reporting companies in the world, the remaining two being Experian and Transunion, commonly known as the “Big Three”. Equifax was established in 1890, with its headquarters based in Atlanta, Georgia. The annual revenue income being about 3.14 billion US dollars and about 9500 employees working globally. Aside from offering credit and demographic related data, services to business, Equifax also sells credit monitoring and fraud-prevention services directly to consumers. (Haselton, T. 2017, September 8).
However, the Equifax company has been in news lately mainly of the major cybersecurity breach incident, which lead to exposure of about 143 billion members personal
…show more content…
Department of Homeland Security, they identified and discovered a flaw in a tool known as the “apache struts”, by which many large businesses and government organizations including Equifax use it to support its online dispute portal or any log issues with their credit reports. The flaw allowed hackers to take control of the Equifax website. The vulnerability is caused by how Apache Struts deserializes untrusted data. An attacker can use the vulnerability to find the credentials, connect to the database server, and extract all data or even delete the data.( Brewster, T.F. 2017, September …show more content…
A credit freeze will lock consumers credit files so that only companies which already do business with them will have access to them. However your first step should be to establish fraud alerts. This will alert you if someone tries to apply for credit in your name. It’s also wise to set up fraud alerts for credit and debit cards. (Dobrygowski, D. & Bohmayr,W. 2017, September 20).
Regular monitoring of your credit report will help you identify any suspicious activity and because the Equifax breach will have long-term consequences, it’s a good idea to start checking your report as part of your regular financial routines for the next few years. Consumers need to be extra vigilant when they get cold-called or receive emails pertaining to being related to this Equifax security breach. If someone is asking for your personal information, do not give it. Also changing your login details and passwords regularly helps you to increase digital security. (Forno, R. 2017, September

You May Also Find These Documents Helpful

  • Best Essays

    Countrywide Financial

    • 3004 Words
    • 13 Pages

    Countrywide Financial was a mortgage-banking firm. They had one of the largest market shares in the early 2000s, when the mortgage market was booming. “No company pursued growth in home loans more aggressively than Countrywide” (NY Times 12/10). They were the leader of their industry, with 500 billion in home loans, 62,000 employees, 900 offices, and $200 billion in assets. Everything had been going well for the company and its employees, until the mortgage crisis began to unfold at the end of 2006. In June 2009, the SEC filed a civil suit against the founder of the business and some of his top management for fraud and insider trading. This came at the height of the mortgage crisis in the US. The founder of Countrywide, Angelo Mozilo, finally agreed to pay $45million in profits and $22.5 million in civil penalties, in which he still admits no wrongdoing.…

    • 3004 Words
    • 13 Pages
    Best Essays
  • Satisfactory Essays

    The Supreme Court of Mississippi applied the language of the UDIPA that says that tax commissions may require a taxpayer to use an alternate method of allocation and apportionment as long as it is reasonable. Also, the court ruled that the taxpayer, not the tax commission, has to satisfy the burden of proof in a trial court and that based on the decision of the trial court, Equifax did not. After evaluating Equifax’s factual claims that the trial judge did not find that the change in apportionment method to violate the Mississippi Administrative Procedures Act and that the penalties imposed were not arbitrary and capricious, the court analyzed whether the trial judge had committed a manifest-error. The court determined that the judge did not…

    • 137 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Concept Check 5-2 and 5-5

    • 500 Words
    • 2 Pages

    Contact the credit bureaus and tell them to flag your file with a fraud alert.…

    • 500 Words
    • 2 Pages
    Better Essays
  • Good Essays

    Facts: Ms. Deters, the plaintiff, sued Equifax, the defendant, in the United States District Court for the district of Kansas after being sexually harassed on several different occasions by three different co-workers and also the original male supervisor. Violating Title VII, prohibiting discrimination of employees based on race, color, religion, sex and national origin. Ms. Deters filed multiple complaints on the daily sexual harassment that had taken place at the office. Mr. Taylor indicated he would handle the sexual harassment, him being the highest managerial position in the office. Mr. Taylor was also designated by Equifax to enact its human resource policies. The courts entry of judgment in the favor of the employee denied the defendants motion on the issue of punitive damages. However, Equifax did not agree with the decision of the court and wanted a judgment as a mater of law de novo. Equifax litigates that the evidence was not in support of the punitive damages.…

    • 487 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved April 29, 2015, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In 2016 one of the biggest financial scandals occurred with one of the major banks in the United States of America. Wells Fargo employees engaged in serious unethical behavior throughout the year of 2016. An uncountable amount of Wells Fargo employees created over two million fraudulent accounts for customers who had no idea. The customers did not know accounts were being opened nor authorized the openings of these accounts. Employees at the Community banking level of Wells Fargo felt pressured into adding more accounts for already existing members. The pressure for added accounts came from higher…

    • 97 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Check your report to ensure clarity – You can easily improve your financial position and credit scores by searching thoroughly at your credit payment history for accuracy. The first point is requesting for a copy of your credit history. This should be done every often to avoid cases of wrong-identity, which are common in people with the same name. Any inaccuracies should be reported instantly to avoid distortions that could hurt your credit scores.…

    • 862 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Predatory lending is unfair and abusive lending practices that convince borrowers who are not adequately knowledgeable in financial matters and who do not have high enough credit score to get a loan at standard condition, to accept the extremely unfavorable credit conditions. Predators lenders’ extremely unfavorable credit conditions that are set such terrible conditions that borrower pay increased loan fees, and higher rates and sometimes the loan terms can cause borrower to lose a significant portion of his own funds or property. Generally, predatory lending strategies include tricking the clients, taking advantage of customer’s lack of knowledge on finance matters, not revealing or hiding the real lending terms, and applying forceful sales techniques.…

    • 799 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.…

    • 1875 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Most adults, who have a background check, have no Medical issues. If some adults who have medical issue could use the gun in the wrong way and not have a background check. Although background checks should be enforced when purchasing a gun. Although over 90% of the public supports background checks for all gun purchases, yet it failed to pass the U.S senate. Background checks will help, people that are not mentally ill be able to own a gun. Mentally ill people would need a background check to see their side effects, and then they can get clear to purchase a…

    • 102 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Courts

    • 350 Words
    • 2 Pages

    Once they have your personal information, identity thieves use it in a variety of ways.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identity Theft

    • 599 Words
    • 3 Pages

    If you find errors on your credit report, what steps would you take to correct them?…

    • 599 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Throughout the years, identity theft has become extremely prevalent and has affected many people. It’s important for everyone to know why identity theft began and the importance of it. There are many causes of identity theft that lead to negative effects. Identity theft is a serious problem that should not be taken lightly. Many people have gotten their wallet stolen or their purse and this is very common. Often times, people put their information on the internet when they do not know exactly who this information is going to. There are thousands of people out there who are out to get your money and/or identity. The things we frequently wonder are why these people take all our information and money. We do not fully understand the causes of…

    • 1108 Words
    • 5 Pages
    Good Essays