Equifax data breach

Assignment Help Business Management
Reference no: EM133021396

Equifax Data Breach

The credit reporting company Equifax was at the center of a massive data breach affecting over 145 million customers. In 2017, hackers took advantage of a vulnerability in Equifax's website software and stole the personal information, including names, addresses, and Social Security numbers, of as many as 145 million Americans. A separate but related incident at Equifax involved 15 million British citizens who had their records violated from 2011 to 2016. The failure of Equifax's internal reporting and control measures led to a widespread violation of peoples' rights to the privacy of their personal information and became a huge public relations crisis for the company.

Equifax's top lawyer, John Kelley, was investigated by the board of directors for his possible involvement in a cover-up of the hack and his mishandling of the situation. Kelley was responsible for approving the sales of company stock by executives after the breach was dis-covered, but before it had been revealed to the public. Upon the disclosure of the breach, company stock price fell 14 percent. Investors sold approximately $4.5 billion (25 percent) of the company's market value after the hack was made public.

More than 10 million Americans had their driver's license data exposed during the hack. Many people who had provided their driver's license information to the company were simply verifying their information in order to receive credit reports and ratings from Equifax. Some had entered their information on the company's web page in an effort to settle credit report disputes. The credit report dispute web page had been particularly vulnerable to security breaches. Equifax CEO Richard Smith admitted during congressional hearings that he and other executives had been aware of the security weaknesses, but that a single employee at the firm had not properly heeded security warnings and did not ensure the implementation of software fixes. Smith added that there was a failure in their software systems designed to scan for the absence of "patches" necessary to protect private information.

Other internal control mechanisms at Equifax appeared to have been either ignored or dysfunctional. Frederick Lemieux, director of Georgetown University's graduate pro-gram in Applied Intelligence, blamed the breach on what he called "passive complicity" in the firm's culture. (Complicity means being involved in wrongdoing; passive complicity implies that executives were guilty of wrongdoing by not actively preventing it.) That top executives seemed to worry more about their own stock portfolios than the security of their customers' personal information was troubling to many ethics experts. Observers also criticized the company for its delay in going public about the breach. Finally, it appeared that knowledge of the potential for hacking was isolated to only one employee. A more robust system where multiple individuals were responsible for preventing a problem might have avoided the hack.

Unlike banks, credit reporting agencies are relatively lightly regulated, and they typically rely on internal systems to maintain security. Lemieux stated, "there is no incentive to comply with the best industry practices and no incentives to spend [funds on these pro-grams] because you're not accountable for it." He noted that credit reporting agencies did not face the same financial or legal consequences that banks or other businesses, like Target or Home Depot, encountered when hacked. Pamela Pressman, president of the Center for Responsible Enterprise and Trade, said that the breach should remind Equifax and other firms to train their employees and raise awareness about proper "cyber hygiene?.?.?.?ensuring that your employees, your contractors, your vendors-those people that have access to your network and your data-understand their role in protecting the network and protecting the data."

The cyberattack on Equifax was potentially more dangerous than other hacks in recent history because credit-reporting agencies played a significant role in determining who received financing and ultimately, how much credit they received. The data collected by these agencies was needed for applying for credit cards, loans, and background checks. The attack was conducted in one major maneuver, which facilitated the hackers' ability to use the data for their own purposes.

This breach could lead to problems for small financial institutions, like community banks and credit unions, which typically relied on information collected by the credit-reporting firms to determine their loan decisions. Larger financial institutions were more likely to collect additional information from applicants, which made them less vulnerable.

Days after the company discovered the breach, CFO John Gamble and two other top Equifax executives reportedly sold a combined $1.8 million worth of shares of the company, but all three denied knowing of the hack when they made the transactions, despite evidence to the contrary. CEO Smith stepped down from his post following these events. Smith had been in charge since 2005. The Federal Bureau of Investigation investigated Equifax's handling of the situation as well as the actions of the top executives. When testifying before Congress, Smith downplayed the severity of the situation and the factors that facilitated the breach. He repeatedly blamed an IT worker who did not implement software remedies after Equifax executives had been warned of possible holes in Equifax's website security by the U.S. Department of Homeland Security.

Equifax hired FireEye's Mandiant group to investigate the breach. The Mandiant report determined that approximately 2.5 million additional U.S. consumers were potentially impacted, for a total of 145.5 million. Mandiant did not identify any evidence of additional or new attacker activity or any access to new databases or tables. Instead, this additional population of consumers was confirmed during Mandiant's completion of the remaining investigative tasks and quality assurance procedures built into the investigative process. The review also has concluded that there is no evidence the attackers accessed databases located outside of the United States.

Equifax claimed they learned of hacking activity in May 2017, but the Mandiant report said the hack started two months earlier. Company executives did not formally disclose the breach until September 2017, however. They admitted that the hack was conducted from May through July 2017. The identity of the hackers was never disclosed.

Questions

  1. What could Equifax have done differently to prevent the cyberattack?
  2. What type(s) of ethical climate existed at Equifax, and did this contribute to the hacking issues there?
  3. What changes should managers and the board of directors make now to reduce to likelihood of an incident like this from occurring in the future?
  4. What types of ethics training would you recommend for Equifax employees in the future to prevent such corrupt behavior

Reference no: EM133021396

Questions Cloud

What will you do in the next phase of the project : what will you do in the next phase of the project to bring those abstract Agile concepts to your practice and how do you believe that this will bring your team
Reflection on agile ways of working and agile teams : MIS608 Agile Project Management - Undertake research to demonstrate an understanding of Agile concepts, tools and techniques.
Social development in developing countries : Do governments and companies in developed countries have an ethical responsibility to contribute to economic growth and social development in developing countri
Evaluate the role of the international monetary system : In 250 - 300 words, evaluate the role of the international monetary system in promoting international trade and investments.
Equifax data breach : The credit reporting company Equifax was at the center of a massive data breach affecting over 145 million customers. In 2017, hackers took advantage of a vulne
Concept of the long tail principle in e-commerce : Explain the concept of the long tail principle in e-commerce. Discuss why it is important. Describe how it can be applied in various ways in any e-commerce proj
Determine the four moral standards : What is the best approach to responding analytically to the following questions in a case entitled " Justice Served" Case 7-2 in the Sport Ethics for Sports Pro
Ideal for accomplished entrepreneurs : Which management styles are ideal for accomplished entrepreneurs? Which management styles do you think are ideal for driving organizational change
Know about sexually transmitted infections : A researcher wants to conduct a study to find out how much adolescents know about sexually transmitted infections.

Reviews

Write a Review

Business Management Questions & Answers

  Sets of cash flows

BUSI 320 Comprehensive Problem 3FALL D Use what you have learned about the time value of money to analyze each of the following decisions: Decision #1:   Which set of Cash Flows is worth more now?  Assume that your grandmother wants to give you gener..

  Explain implications of events to the corporation

In 2020 and 2021 Amazon (warehouse, logistics, delivery of goods and services) has had multiple newsworthy events around staffing, remuneration, health and safe

  What happened to cause the business or product to fail

What happened to cause this business or product to fail? This assignment is meant to get you thinking outside the box, and to have fun and be creative. There is no right or wrong answer.

  Result of new learning system

A. In this scenario, what is changing b. What does Ozzie expect to be different as a result of new learning system

  Writing a project scope

Discuss what details can be included in a project scope, and what items should not be included.

  Providing comprehensive information about strategic

Strategic Management Insight is an online platform dedicated to providing comprehensive information about Strategic Management related topics.

  What is the operating cash flow

ABC, Inc., is considering purchase of a new equipment. The expected sales are expected to be $5,535,496. The annual cash operating expenses are expected to be $3,877,056. The annual depreciation is estimated to be $567,967 and the interest expense..

  Apply strategic management processes

Apply strategic management processes to analyze and improve organizational performance.

  Prepare the definition of various leadership theories

Assignment: Theories of Leadership- Prepare the definition and characteristics of various leadership theories and approaches to leadership

  Examine the snapshot of a transaction log

Examine the following snapshot of a transaction log. After the failure, during automatic recovery, Transaction T4:

  Explain two ways of justifying actions of whistleblowing

1. Identify and explain four reasons as to why you would blow the whistle at your workplace?

  Describe an effective leadership approach

Describe an effective leadership approach from a biblical perspective include the following:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd