Equifax Breach: Phishing attacks on the horizon

Cyber criminals have stolen 143 million credit records in the recent hacking scandal at big-three credit bureau Equifax.

equifax

The payload of information stolen included SSN’s, D.O.B.’s, and names of 150 million U.S. citizens. That is almost half of the U.S. population. Read more about the breach here. Now, with an abundance of personal information in the hands of cyber criminals, security experts are saying highly targeted phishing attacks are coming next.

 

Watch out for the following:

  • Phishing emails that claim to be from Equifax where you can check if your data was compromised
  • Phishing emails that claim there is a problem with a credit card, your credit record, or other personal financial information
  • Calls from scammers that claim they are from your bank or credit union
  • Fraudulent charges on any credit card because your identity was stolen

 

Here are 5 things you can do to prevent identity theft:

  • First sign up for credit monitoring (there are many companies providing that service including Equifax but we cannot recommend that)
  • Next freeze your credit files at the three major credit bureaus Equifax, Experian and TransUnion. Remember that generally it is not possible to sign up for credit monitoring services after a freeze is in place. Advice for how to file a freeze is available here on a state-by-state basis: http://consumersunion.org/research/security-freeze/
  • Check your bank and credit card statements for any unauthorized activity
  • If you believe you may have been the victim of identity theft, here is a site where you can learn more about how to protect yourself: www.idtheftcenter.org. You can also call the center’s toll-free number (888-400-5530) for advice on how to resolve identify-theft issues. All of the center’s services are free.


 

Escape from the cycle of reactive, fast fixes with our proactive approach to security. Learn more:

Security Solutions 

 

Get IT tips and insights right to your inbox. Subscribe to the iV4 Blog: