Posted on Oct 7, 2015
Update: Class-action lawsuits for Experian are increasing, according to The Hill. Experian, who released half-year financials yesterday, was quoted as saying: “It is currently not possible to predict the scope and effect on the Group of these various regulatory and government investigations and legal actions, including their timing and scale."
The T-Mobile breach of 15 million customers via its third-party partner Experian is taking an unfortunate toll on both organizations as negative perception is flowing mightily right now. Crisis communications are having to be applied all over between a credit bureau and a large mobile carrier partner that likely represents a nice credit-check business for Experian.
News of the breach happened October 1. Today, there are at least five class-action lawsuits against both companies, and a sixth suit that names Experian alone in less than a week, according to Bloomberg.
In the first few days after the news of the T-Mobile/Experian hack, there has already been public outcry for the head of Experian to be fired. There are public statements from T-Mobile's CEO about being “incredibly angry” and will be looking to end its partnership with Experian.
State attorney generals in Massachusetts, Connecticut, and Illinois have announced they will be probing the breach. More state investigations are likely to follow.
There are 15 million customers with private information in the public sphere, the most damaging being social security numbers. Not worried about your social security number? You should be. In 2011 alone, the U.S. Internal Revenue Service estimated it issued over $3.5 billion in possibly fraudulent tax refunds.
Some security experts will tell you the use of social security numbers as individual identifiers in digital formats should end. They were never intended to be used in this way, and they are incredibly easy to use in fraudulent activity. What is the right answer? Some countries have moved toward biometrics, but they have their own set of issues say privacy advocates.
For the time being, however, consumers, companies, and lawmakers will continue to point fingers as the lawsuits mount and the damage control experts are called in to do their work. The lawsuits will likely take years to come to an end. Ask Target. They are unfortunately still dealing with the fallout from a third party breach two and half years later.
The data and analytics company which is well known for its credit rating services for consumers via the FICO score, has an overall grade of a ‘C’ in our security risk benchmarking platform which weights 10 overall security categories and factors.
“It appears that Experian has a ‘D’ within the IP Reputation category (indicating persistent malware infections), a ‘C’ in Application Security (indicating improperly configured web applications), an ‘F’ in Network Security (indicating potentially vulnerable Internet-facing services such as FTP and telnet),” said Alex Heid, Chief of Research, SecurityScorecard. “We find that Experian is frequently mentioned within Hacker Chatter as malicious actors discuss ways to leverage the company for identity theft and pulling personal information about potential targets.”
Experian also has a ‘C’ in the Social Engineering category where our proprietary technology found nearly 100 (98) social network user logins that have been discovered using leaked employee email addresses. Our remediation advice which is featured in our benchmarking platform, offers the following solution to the social engineering dilemma:
“Provide security awareness training to help educate employees about the proper use cases of corporate credentials including explanation of the risk of spear phishing, credential reuse, and how to properly respond to a spear phishing campaign. “Consider the implementation of a policy regarding the use of enterprise resources when engaged in public social networking activity, which may sometimes be needed for business reasons.”
Managing vendor risk can be as simple as an instant security audit. Since SecurityScorecard is continuous, and features built-in alerting, actionable risk intelligence flows directly to you as it changes. Our benchmarking platform is self-service, so the most useful risk information is always available, on demand.
If you want to share the information, you can with our collaborative workflow that allows you to invite vendors to view and resolve issues seen on the Scorecard. Speed up the time to remediate risk at unprecedented scale. Know the security-risk posture of any company— instantly.
Check out our list of 3 top third party risk management (TPRM) challenges, and the actions you can take to bolster your program. Learn more.
Performing cybersecurity risk assessments is a key part of any organization’s information security management program. Read our guide.
Templates and vendor evaluations are needed to level that playing field, in a time efficient and fair way, so that the best vendors are chosen.
Co-founder and CEO, Alex Yampolskiy, speaks about the importance of measuring and acting on key indicators of cybersecurity risk.
You’ve invested in cybersecurity, but are you tracking your efforts? Check out our list of 20 cybersecurity KPIs you should track. Read more.
No waiting, 100% Free
Get your free scorecard and learn how you stack up across 10 risk categories. Answer a few simple questions and we'll instantly send your score to your business email.