Access Millions of academic & study documents

Screenshot 20211204 132508 drive

Content type
User Generated
School
University of Nairobi
Showing Page:
1/1

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
coordination, and IT-Security coordination” at the time of the breach.11 A number of teams dealt with cybersecurity issues at Equifax. Among them were the Global Threat and Vulnerability Management (GTVM) team, the Vulnerability Assessment team, and the Countermeasures team. The GTVM team tracked threats to the security of Equifax's IT systems and notified relevant personnel across the company about such threats through emails and monthly meetings. The Vulnerability Assessment team ran regular scans of Equifax's IT systems for vulnerabilities, and the Countermeasures team deployed code designed to obstruct the exploitation of ongoing vulnerabilities while IT “system owners” installed patches to resolve the underlying software problems. 12 Mauldin and Webb both resigned in September 2017, following the fallout from the breach. 3 4/28 118-031 Data Breach at Equifax Prior Security Issues Prior to the breach in 2017, Equifax had suffered several security lapses. Between April 2013 and January 2014, hackers accessed credit report data from Equifax. In 2015, a "technical error" ostensibly caused by software modifications publicly exposed consumer information. In 2016, another incident exposed the salary and tax data of 431,000 employees at Equifax client Kroger. Finally, in February 2017, Equifax discovered that hackers were exploiting Equifax Workforce Solutions, downloading employee tax documents on Equifax clients like Northrop Grumman and Whole Foods. Equifax retained cybersecurity firm Mandiant to investigate the Workforce Solutions incident in March. While conducting its investigation, Mandiant“ warned Equifax that its unpatched systems and misconfigured security policies could indicate major problems.” 13 Equifax had received other warnings about potential cybersecurity vulnerabilities. In December 2014 nindanondont vocanuobou diocaround that ...faw badleft conc.nouifuation avecdona ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4