Equifax has incurred losses of over $1.35bn so far following the devasting 2017 data breach involving the breach of 145 million customers personal financial data.

In the attack, hackers exploited a known security vulnerability that Equifax had left unpatched and compromised the personal and financial details of more than half of all Americans and millions on UK consumers. The known Apache Struts 2 flaw which caused this breach was left unpatched for over 2 months after a patch was issued. Data was exfiltrated for several months once hackers spotted the vulnerability.

The $1.35bn spent has been spent to adopt incremental technologies and pay associated data security costs, as well as “accrual for losses associated with the legal proceedings and investigations”.  

The company claims that breach costs for the remainder of the year will be less than that spent in 2018, but during the first three months of 2019, the company has spent $82.5 on technology and data security, $12.5m in legal and investigative fees, and $1.5m for product liability.

Costs associated with technology and data security involve efforts to transform the technology infrastructure and improve application, network, and data security.

These new revelations should serve as a warning to organizations failing to implement proper cyber security controls. We suggest starting by implementing the Center for Internet Security CIS Controls. These twenty controls serve as the essential go-to guide for any data security and compliance professional and are broken down in three categories – basic, foundational, and organizational.

The first six CIS Controls (Basic) are the most critical to implement and manage. By just implementing the first six CIS Controls, your organization can prevent up to 90% of pervasive and dangerous cyber-attacks.

NNT’s products uniquely align with the requirements of these basic controls by providing a suite of products that address each of the control requirements.

To learn more about the Basic CIS Controls (Controls 1-6), click here to read our Guide to Understanding the Basic CIS Controls

To learn more about the CIS Controls, download our detailed whitepaper.

To learn more about how NNT addresses the CIS Controls, download our CIS Controls Solution Brief.

NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
1175 Peachtree St NE
Atlanta, Georgia, 30361.
Portland
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.