Close Menu
  • Briefing
    • Cover Story
    • Latest News
    • Counties
  • Politics
    • Society
  • Special Reports
    • Companies
    • Enterprise
    • Money
    • Technology
  • Columns
  • Dispatches from China
  • Member Content
    • Shop
  • Contact Us
    • About us
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram LinkedIn
Nairobi Business Monthly
Subscribe
  • Briefing
    • Cover Story
    • Latest News
    • Counties
  • Politics
    • Society
  • Special Reports
    • Companies
    • Enterprise
    • Money
    • Technology
  • Columns
  • Dispatches from China
  • Member Content
    • Shop
  • Contact Us
    • About us
Nairobi Business Monthly
Home»Technology»Lessons from the most impactful data breach in U.S history
Technology

Lessons from the most impactful data breach in U.S history

NBM CORRESPONDENTBy NBM CORRESPONDENT8th December 2017Updated:23rd September 2019No Comments4 Mins Read
Facebook Twitter WhatsApp Telegram Email
Share
Facebook Twitter WhatsApp Telegram Email

BY ALASTAIR PATERSON

While Equifax is the latest major data breach to hit the headlines, we know it will not be the last. How prepared is your organization if you were similarly targeted?

As we all know, the impact of the Equifax breach is widespread, potentially affecting 143 million individuals in the U.S, Canada and the UK whose personally identifiable information (PII) and (to some extent) financial information was accessed by malicious actors. The exact impact is yet to be seen and depends on the motives of the attackers and the ways in which they plan to use the data, but any exposure puts individuals at risk. We’ve also seen tremendous impact on the company as a result of the breach, including a dramatic drop in share price, reputational damage, and job losses for some senior staff members including the CEO. There’s more to come as the total costs of dealing with the breach itself mount and the incident makes its way through the legal system.  It is appropriate to reflect on the lessons we can learn before, during and after discovering a breach to address gaps in processes and technologies and help prevent, detect and mitigate these types of threats.

The Nairobi Law Monthly September Edition

Before the breach

Equifax has said that the initial intrusion was through exploitation of a vulnerable Apache Struts web application. It turns out that prior to the intrusion multiple alerts about exploitation of this particular vulnerability were issued and a patch was made available. However even without following recommended patch management programs, implementing other basic security principles could have mitigated the damage.

Lessons:

  • Maintain awareness of what an attacker can see regarding your infrastructure, people and processes so you can see potential weaknesses and points of access for attackers.
  • Understand what methods attackers are using against your sector so you can proactively protect your valuable digital assets.
  • Establish and maintain a threat intelligence program and act on the intelligence.
  • Implement and follow general cybersecurity good practice measures, such as defense-in-depth, and include vulnerability and patch management.
  • Protect your sensitive information through the use of encryption and network segmentation.
  • Educate users on the importance of password hygiene and strong authentication requirements.
  • Go a step further and assume a breach will occur and plan for this outcome.

After discovery

Not only did Equifax have to deal with the fallout of the breach itself, but unusual trading activity in Equifax shares have provoked suspicions of insider trading and a criminal investigation. Further, Equifax’s infrastructure to handle customer inquiries proved inadequate and some of the strategies put in place to address customer concerns in the wake of the discovery backfired.

Lessons:

  • Control knowledge of a breach to trusted individuals to prevent collateral damage; no matter how swiftly an organization moves there will always be some lapse in time between discovery and disclosure.
  • Anticipate fallout and prepare for announcements by analyzing the possible consequences of decisions to mitigate negative publicity and outcomes.
  • Closely monitor response and make arrangements for extra bandwidth capacity  to handle an initial flood of inquiries if needed.

After public disclosure

Once a breach is disclosed, researchers and opportunistic malicious actors will look for additional weaknesses in infrastructure. After the Equifax breach an insecure portal used to manage credit report disputes was discovered. When the news becomes public immediate questions arise as to who was responsible, what data was compromised and how the data is being used. The answers to these questions can dictate the impact of the breach to the organization and its customers.

Lessons:

  • Communicate clearly when a breach happens, stating the knowns and unknowns publicly; speculation from media and researchers can damage reputation.
  • Look for your compromised data online to try to discern the attacker’s motive, if not identity; understanding whether the motive was financial gain may help mitigate against prolonged malicious activity.

U.S. Headquarters Dig

The Equifax breach has had a damaging impact on the company and has put its customers at risk. But it has also served as a wake-up call for organizations around the globe. Security professionals and executive management can use this as an opportunity to identify areas they can address to better prepare for and deal with a breach. In the weeks and months to come as more information comes to light, it’s in our collective best interest to focus on gaining a deeper understanding of what we can do to mitigate risk.

Writer is CEO and co-founder, Digital Shadows

The Nairobi Law Monthly September Edition
Follow on Facebook Follow on X (Twitter) Follow on WhatsApp
Share. Facebook Twitter WhatsApp Telegram
NBM CORRESPONDENT

Related Posts

CEOs bracing for threat to jobs from AI

1st January 2025

Taking advantage of AI to reduce gap in tech race

27th December 2024

Arrest of Telegram’s founder highlights lack of unified approach in tackling crime

24th September 2024

Judiciary leverages automation to improve service delivery

17th September 2024
Add A Comment

Leave A Reply Cancel Reply

The Nairobi Law Monthly September Edition
Latest Posts

Plan unveiled to shield Kenyans from financial risks

26th June 2025

CAK bans exclusive ISP deals in housing estates

24th June 2025

Visa applicants warned over early appointment scams

24th June 2025

Entrepreneurship can build better tomorrow

23rd June 2025

16 million non-filers spark tax crackdown by KRA

23rd June 2025
The Nairobi Law Monthly September Edition
Nairobi Business Monthly
Facebook X (Twitter) Instagram LinkedIn
  • About Us
  • Member Content
  • Download Magazine
  • Contact Us
  • Privacy policy
© 2025 NairobiBusinessMonthly. Designed by Okii

Type above and press Enter to search. Press Esc to cancel.