Equifax experienced a data breach that occurred in mid-May 2017, was first discovered on 29 Jul 2017, and was publicly disclosed by the company on 07 Sep 2017. The breach affected 143 million individuals in the United States, Canada and the United Kingdom. Immediately after the disclosure Equifax faced widespread criticism from the media, researchers and customers. There have also been allegations of insider trading and legal implications. In our paper Equifax Breach: Lessons Learned for Your Organizations, we outline how the events surrounding the breach demonstrate several important learning points organizations can use to inform their own security posture.
The largest immediate impact to Equifax was loss of investor confidence; the share price dropped 34 percent within eight days after the breach disclosure. The company also risks revenue loss resulting from reduced business, especially considering customers’ loss of confidence in the company to secure data. As with all data breaches, Equifax will also incur financial losses through its responsive investigations and, likely, costs resulting from lawsuits.
Swift public criticism followed around Equifax’s security posture, its handling of the breach and the exposure of the sensitive customer data. Some employees have been accused of insider trading, and others have reportedly left their positions, such as the chief security officer and chief information officer. Reputational damage may have a mid- to long-term effect on the company’s revenue generation and a prolonged impact on its finances.
The key lessons organizations can learn from this event are:
- Maintain an external view of your digital footprint to be aware of what an attacker can access, what is vulnerable to attack and what methods attackers are using against your sector.
- Establish and maintain a threat intelligence program, and act on the intelligence; Digital Shadows (now ReliaQuest) provided clients with multiple alerts about exploitation of the vulnerability that affected Equifax, prior to the intrusion.
- Implement and follow general cyber-security good practice measures, such as defense-in-depth and including vulnerability management. Plan as if an attacker will compromise your network and ensure your sensitive information will be protected.
- Assume a breach will occur and plan for this outcome. Ensure people, processes and strategy are in place in advance of it.
- Control knowledge of a breach to trusted individuals and prepare for announcements by analyzing the possible consequences of decisions.
- Communicate clearly when a breach happens, stating the knowns and unknowns publicly. Speculation from media and researchers can damage reputation.
- Look for your compromised data online, to try to discern the attacker’s motive. Understanding whether the motive was financial gain may help mitigate against prolonged malicious activity.
Download a copy of our paper to learn more about the impact of the breach and the lessons organizations can learn at three different stages: pre-breach, post-discovery and post-disclosure.