Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Lessons learned in the five years since the Equifax data breach

By Paul Farrington
data-law-freepik1170x658.jpg
May 17, 2022

Hindsight is 20/20. Almost five years ago, Equifax announced that it had been breached and that the sensitive data of over 148 million people, about 56% of Americans — including names, home addresses, social security numbers, driver’s license information, etc. — had been compromised. There were an additional 209,000 credit card records leaked as well. While there have been larger-scale attacks since then, Equifax was unprecedented in its time. Instead of taking a critical approach, the Equifax breach has taught and will continue to teach, essential cybersecurity lessons that can help business leaders protect their customers even better moving forward.


So what happened?

As a reminder, in March of 2017, Equifax, one of three major credit reporting agencies (CRAs) in the United States, was informed of a vulnerability in its system that potential hackers could exploit, but the company failed to install the necessary patches. Six months later, in September, they announced that hackers did penetrate the vulnerability, consequently leaking massive amounts of sensitive information. 


Five years later, a settlement reached with the FTC, Consumer Financial Protection Bureau and 50 U.S. states and territories has just been finalized. The agreement offers up to $425 million and free four-year membership in Experian Identity-Works, which assists with identity theft, to help those affected.


What can be learned from this?

While Equifax knew about the vulnerability, the lack of urgency to install the patches left them doomed once hackers decided to attack. Cyberattacks, while now very common with a 62% year-over-year increase, previously left organizations with the thought that it might not happen to them. Now with cybercriminals being capable of penetrating 93% of company networks, it demonstrates that not only are more organizations more vulnerable than they probably think, but that without the proper proactive security measures in place, they could very well be the next victim. It is truly a matter of when, not if.


Proactive versus reactive

A reactive strategy is just as it suggests, having a plan in place for when something happens. In the world of cybersecurity, this could be insurance, disaster recovery systems or other back-up options. While it’s not inherently bad to have those in case you need them, they shouldn’t be your go-to line of defense. 


By contrast, taking on a proactive approach can spare a ransomware hangover resulting in possible consequences of encrypted or lost data, downtime (and the cost associated with it), damaged reputation and the amount of work it takes to return to business as usual. In the case of Equifax, it cost them all of those and more with a multi-million dollar settlement and years of legal fees. Had they taken the proactive opportunity to install the necessary patches, they could’ve avoided this whole ordeal.


What are my proactive options? 

If you haven’t already, there’s no better time to implement a zero trust approach. Since organizations are vulnerable not only from outside hackers, but bad actors and insider threats, this approach works just as suggested: by default, no one is trusted regardless of where they stand in a company. Especially as things like ransomware-as-a-service (RaaS) have entered the market, and cybercriminal groups are heavily recruiting from inside their target organizations, trusting no one is really the only option. 


Always make sure your vulnerabilities are patched as soon as you’re made aware of them. As mentioned above, cyberattacks are no longer an if, but a when situation. Taking immediate action can prevent you from the pains that Equifax had to endure.  


In addition to implementing a zero trust approach, finding the proper proactive security features can help you protect your organization automatically. With file-based threats on the rise, and with approximately 1 in every 100,000 files containing potentially malicious content that can take up to 18 days to be detected by antivirus software, a content disarm and reconstruction (CDR) can be a simple solution. Not only can CDR technology instantly clean and rebuild files to match their ‘known good’ manufacturer’s specification, automatically removing potential cyber threats that could be attached, but it can also help spot zero day threats that might go undetected. This strategy ensures that every document is safe without sacrificing productivity or risking the damage threats could do once they’ve entered the system.


While breaches, such as Equifax, could have been prevented, every cyberattack helps others learn how to better protect themselves in the future. Don’t take a passive role in protecting your organization, but rather be ready and proactive so you’re less likely to deal with the headache that can come along with it. 

KEYWORDS: business continuity cyber security data breach Equifax risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Paul Farrington is Chief Product Officer at Glasswall. Driven and energetic executive with 20+ years of experience in developing SaaS software products, Farrington guides the strategic direction of product portfolio and development team at Glasswall, bringing huge expertise and energy to his key leadership role.


Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0820-Data-Feat-slide1_900px.jpg

    Lessons learned from the Equifax data breach

    See More
  • lessons-ideas-freepik1170x658.jpg

    3 security lessons we haven’t learned from the Kaseya breach

    See More
  • education-training

    Cybersecurity lessons learned in the K-12 sector

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • January 30, 2025

    Iconic and Secure: Security Lessons Learned at Georgetown University

    ON DEMAND: Georgetown University, a major international research university with nine schools, an affiliated hospital, and many highly-ranked academic programs, has a mature, layered security program.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing