Loading...

Question

Why Equifax was Hacked

Assignment Instruction

The 2017 "Data Breach at Equifax" case (HBSP S596 Coursepak) provides an insightful and cautionary tale for managing cyber risks across a firm at many levels of responsibility.  The purpose of this assignment is to motivate you to read broadly and think deeply regarding the real causes of the Equifax situation.

The title is the assignment prompt for your analysis:  "Equifax - Why?"  (Why did this happen?)

The assignment provides an opportunity to demonstrate your skills in assessing how the principles and insights from the National Association of Corporate Director's Cyber-Risk Oversight (Links to an external site.) reading were or were not working at Equifax (NACD PDF also is here https://iu.instructure.com/images/svg-icons/svg_icon_download.svg Download here).  You should draw on any part of the NACD full document or other course readings, videos or reference materials that are helpful to demonstrate your original assessment of the actions of the management team and/or the board. Additionally, the Internet is replete with countless articles and assessments of the Equifax incident.  You are encouraged to read and also consider any of those that further improve your understanding of the situation.  If you choose to draw on any of those sources, you must cite them properly as footnotes or endnotes for your work. You can use any professional style for the citation format.  This provides an example of using the APA format and one of the widely available citation generators for the URL.

Perhaps you write something like:  Hacker groups, and even government-supported hacker groups, are recycling spy-grade malware that was created by other governments and leaked or intentionally shared. [No direct quote, but citing a source I read that affirms what I wrote]Or something like this:  As noted by former NSA analysts, "Why would you develop something new when three-letter agencies and other groups are creating just incredible malware that’s fully featured, fully tested, and a lot of times has even already been tested in the wild?”1  [Includes a direct quote with citation and source.]

1Newman, L. H. (2020, February 25). North Korea Is Recycling Mac Malware. That’s Not the Worst Part. Wired. https://www.wired.com/story/malware-reuse-north-korea-lazarus-group/

You do not need to cite the case itself, and you can assume that all case facts are known to the reader.  You can simply refer to the case or a fact and say something like "we know ..." and that will be inferred to come from the case.  Do properly cite the NACD document as it is an outside source.Your assignment should be submitted in the format of a 2-page memo to me, single-spaced.  The memo should be clear in logical flow, use section headings, written with precision and succinct clarity, and include a your "bottom line" insight from the incident.  Endnotes can run over to page 3 if needed.  Please do keep your analysis to 2 pages, but don't worry if when you view it through Canvas' preview that it may appear to extend to page 3.  It is a an occasional known bug for some file Professional Communication: (longer description)The work was presented in a clear, organized, logical, and professional way in style. It was free from grammatical errors and professional in tone. It was clear in original work and proper reference to the work of others (if needed)

Quality of Insight

The work demonstrated clear application of the assigned readings to the topic. It provided integrative insights to show original thought at the graduate level.

Expert Solution

Any company's operations dealing with confidential material about their consumers and operational commitment must prioritize cyber security. The company will gain confidence if customers know their data is secure. This was not the case with the Equifax incident, which led to a decline in customer confidence and undermined the anticipated results. Private information of Americans, Europeans, and Canadians was exposed in this security breach. This cyber-attack was considered a serious cybercrime that exposed the victims to identity theft. In the end, the United States Justice Department revealed the People's Republic of China to be in charge of the security breaches that impacted Equifax. However, there was insufficient proof that China had used the information it had gained through the data breach. Government representatives from China denied any participation in the Equifax data leaks. Therefore, it is critical to evaluate the data breach experienced by Equifax to determine the internal causes behind the security vulnerability concerning security measures being followed, data laws being broken, and vulnerabilities not being catered for, leading to the compromise of the client's data.

Network vulnerabilities have grown so common that only the most remarkable cases, such as the previous Equifax Inc. hack, make news. The business first disclosed the security breach in 2017 and later estimated that more than 140 million customers were impacted. Numerous pieces of sensitive information on consumers were accessible to hackers (White, 2017). During the inquiry into the breach, Equifax said that it was told in March that cybercriminals may use a weakness in its network but that it did not apply the necessary updates. The assault began when hackers scanned the web for systems with exposures that the US-CERT had warned about only days before (Wang & Johnson, 2018). They struck gold with Equifax's arbitration portal, where users could go to contest accusations. Hackers obtained access to three servers by exploiting an Apache Struts weakness, a months-old flaw that Equifax was aware of but failed to address. They discovered that those details gave them access to an additional 48 servers storing private information. The perpetrators remained on Equifax's server for 76 days before being discovered (White, 2017). Further investigation discovered that the hackers grabbed the data from 51 databases piecemeal to avoid setting off any warnings (Wang & Johnson, 2018). More than two months after the incident, Equifax discovered it and blocked the criminals' access (White, 2017). Thus, the firm failed to fix a server weakness which ultimately cost them their network security, compromising numerous pieces of sensitive information.

The development of new methods by hostile and anonymous hackers to undermine system security is occurring simultaneously as technology for adopting extra security measures progresses. Because of the inadequate security mechanisms built into the system, Equifax had a data breach. As a result, even though most boards are unprepared for this responsibility, corporation board members are required to assure cyber security (Zou & Schaub, 2018). In the case of Equifax, significant choices and actions were made before the intrusion that affected the consumers. These judgments had a few components related to specific legal compliance concerns (White, 2017). First, Equifax did not fully abide by the rules safeguarding customer information. Second, Equifax neglected to upgrade its web servers; as a result, making customer information exposed. One example is how, between April 2013 and January 2014, a hacker gained access to credit report information. Additionally, a technical mistake was made by Equifax during a software update that exposed customer information (White, 2017). Details on W-2 forms were compromised between 2016 and 2017 by Equifax divisions that maintained the data (White, 2017). In addition to storing certain customer data on a server that was accessible to the public, Equifax utilized weak passwords to protect their data (Wang & Johnson, 2018). Therefore, judgments and technical mistakes related to security measures ultimately caused customers' information to be hacked, where Equifax neglected to upgrade its web servers.

Both data leak laws were broken, which would have required Equifax to notify customers as quickly as possible and safeguard their data from breaches and insider trading regulations. This was clear from the cyber safety measures implemented by Equifax (Cowler, 2018). Although Equifax set up security precautions, one may counter that no security code is impenetrable and that every firm is susceptible to hacking (Newcomb, 2017). However, the business did not take further steps to secure the customer data by going above and above. For instance, a technological error resulted in the exposure of financial data in February 2017 for clients who used a Life Lock service via Equifax (Wang & Johnson, 2018). The Homeland Security Department warned Equifax on March 8, 2017, of a significant vulnerability in material that Equifax was employing (Wang & Johnson, 2018). According to company standards, once contacted, the issue should be remedied within 48 hours (White, 2017). Internal workers, however, neglected to alert the appropriate individual to fix the program proactively. In late March, an internal examination of the Equifax servers failed to detect unfixed software (Richardson et al., 2019). Data laws were broken from the neglect of the firm's here necessary entities and failed to address the issue brought forth by the security department proactively. 

Corporations' capacity to handle the cyber security risk has had ramifications for corporate reputations and executives' professional profiles. Equifax's security flaw will harm its standing in comparison to its competitors. Equifax will not only lose consumers, but many of them will switch to other services. Consumers' prior faith in Equifax would have been substantially weakened (Richardson et al., 2019). Customers may conduct business with alternative credit reporting organizations that provide superior services. As a result, the company's future prosperity will suffer. Workers may lose their employment as a result of the loss of shares. This might undermine the firm and cause it to fail. In addition, it will be challenging to win back customer confidence. It was insufficient for Equifax to provide people whose private details were compromised with online privacy protection since the company's image is crucial to its future (Gressin, 2017). It would have been vital for Equifax to explain along with recompense to the people whose data had been compromised (Newcomb, 2017). They should have worked hard to identify the hackers and bring charges against them.

It is critical to evaluate the data breach experienced by Equifax to determine the internal causes behind the security vulnerability concerning security measures being followed, broken data laws, and vulnerabilities not being catered for, leading to the compromise of clients' data. The assault began when hackers scanned the web for systems with exposures that the US-CERT had warned about only days before. They struck gold with Equifax's arbitration portal, where users could go to contest accusations. Additionally, judgments and technical mistakes related to security measures ultimately caused customers' information to be hacked, where Equifax neglected to upgrade its web servers. Data laws were also broken from the neglect of the firm's here necessary entities that failed to address the issue brought forth by the security department proactively. Ultimately, Corporations' capacity to handle cyber security risks has had ramifications for their clients and corporation capacity.

References

Cowler, S. (2018). Ex-Equifax Executive charged with Insider trading tied to ’17 Breach (Published 2018). Nytimes.com. https://www.nytimes.com/2018/03/14/business/equifax-executive-insider-trading.html.

Gressin, S. (2017). The Equifax data breach: What to Do [Ebook]. https://www.penncommunitybank.com/wp-content/uploads/2019/12/The-Equifax-Data-Breach_-What-to-Do-_-Consumer-Information.pdf.

Newcomb, A. (2017). A massive Equifax breach could affect half of the U.S. population.. NBC News. https://www.nbcnews.com/tech/security/massive-equifax-data-breach-could-impact-half-u-s-population-n799686.

Richardson, V., Smith, R., & Watson, M. (2019). Much Ado about nothing: The (Lack of) Economic Impact of Data Privacy Breaches. Journal Of Information Systems33(3), 227-265. https://doi.org/10.2308/isys-52379

Wang, P., & Johnson, C. (2018). Cyber-security incident handling: A case study of the Equifax data breach. Issues In Information Systems. https://doi.org/10.48009/3_iis_2018_150-159

White, G. (2017). A Cybersecurity Breach at Equifax left pretty much everyone's financial data vulnerable. The Atlantic. https://www.theatlantic.com/business/archive/2017/09/equifax-cybersecurity-breach/539178/.

Zou, Y., & Schaub, F. (2018). Concern but no action. Extended Abstracts Of The 2018 CHI Conference On Human Factors In Computing Systems. https://doi.org/10.1145/3170427.3188510

Please enter your email address to h

  • 100% Plagiarism-free
  • 100% Human-written
Blurred answer