Warning: Your session is about to expire due to inactivity.

LiveChat

800-707-9903

8A-6P EST Mon-Fri

Managing the Equifax Security Breach

Managing the Equifax Security Breach

Lately, it seems that we have been inundated with news of the Equifax cybersecurity incident since the breach was reported in the first week of September. All the updates, advice, and general fear over the far-reaching effects, has had many of us reaching for the panic button. Luckily for us, here at Conquest Graphics, we have a dedicated, highly skilled team of IT experts and network technicians that have been helping to sooth our worried minds. Even if you don’t have these great resources at your disposal, we have compiled some of their best practices along with five steps that you can take right now to help you deal with the aftermath of this latest hack.

Step One: Does this concern me? Find out now.

More than 143 million Americans have been affected by this major security breach, which is roughly half of the adult population. Cyber criminals struck gold this time and made off with some seriously confidential information. Your name, Social Security number, birth date, address, and driver’s license number could be in the hands of someone with malicious intentions. Go directly to the source by visiting Equifax's Security Website. You can find the most up-to-date information and find out if you have been directly impacted.

Step Two: Enroll in a Credit Monitoring Service.

So, this happened. Now what? Enrolling in a credit monitoring service is a great way to take immediate action. Equifax is offering a complimentary monitoring service called TrustedID which provides the following services:

  • Equifax credit report
  • 3-bureau credit file monitoring
  • Equifax credit report lock
  • Social Security number monitoring
  • Up to $1 Million in identity theft insurance.

Credit monitoring services have programs that review your credit files constantly for changes that could indicate fraud. And yes, Equifax is one of the three major credit bureaus. And yes, they were the target of this most recent cyberattack. Whose credit reports can you trust? When in doubt, consult a trusted, independent source. Our recommendation: NextAdvisor.com. This site is a trusted, independent source for comparing the several top credit monitoring services to help you determine the best program for you.

Step Three: Monitor ALL your accounts. Diligently.

This is no small task for most of us. Constant vigilance requires work. If you need motivation, here is a sobering reality check: this security breach first occurred in May. Your information may have been in the hands of criminals for the past four months. The final impact of this recent attack is impossible to determine, but that shouldn’t prevent you from fighting back. Take the extra time to review your account statements and be on the lookout for any changes in person information or unusual activity.

Step Four: “Go Phish" is not a fun card game that you want to play. The stakes are much higher.

Phishing attacks are very common in the hacking aftermath. Criminals rely on several deployment methods including phone calls, emails, or text messages. Their main objective is to obtain user data such as login credentials and credit card numbers. Be wary of any communications that require your “urgent action” or attempts to redirect you to a “secure link” to change your password. Always think before you click.

Step Five: Take offensive measures.

Identity theft can wreak havoc in your life for years. The Federal Trade Commission specializes in consumer protection and has some very useful advice to offer.

  • Consider activating a credit freeze, which makes it harder for someone to operate a new account in your name.
  • File your taxes early. Scammers can use your Social Security number to file in your name and get your refund.
  • Do not believe anyone who calls and tells you that you must pay taxes or a debt immediately, even if they have your personal information.
  • Change the passwords and login information for all your accounts.

For more recommendations and solutions based on what type of information that may have been compromised, visit the FTC Identity Theft site.

These are concerning times for many of us because of the fears and worry surrounding the escalating degree of cyberattacks. It is frustrating and overwhelming, but we can all persist in monitoring and safeguarding our personal information. We also want to take this opportunity to assure our customers that their security is paramount to all of us at Conquest Graphics. For more detailed information on all the ways that we are committed to this goal, please visit the and Privacy Protection and Secure Shopping policies at ConquestGraphics.com.

Act mindfully and always click safely!

Option Information

X