Use your computer fearlessly.




Mission Services Articles Research






Report Data Breaches

by Brent Kirkpatrick

(Date Published: .)



Do not be like Equifax.



Every time hackers gain root access to a computer containing sensitive data, breach must be reported. This means as soon as successful hacking is discovered, the data on the compromised computer should be cataloged. Notice of breach is given to every person whose personal or health data was found on the hacked computer.

Some companies, such as Equifax, seem to think that they can avoid reporting until after a forensics expert discovers how the hack was performed. This is like waiting until after a trial to protect a victim. Just like some victims never find justice, due to a lack of evidence, many successful hacks leave few forensics traces. To wait until after detailed evidence is discovered is unconscionable.

Six months after they were hacked, Equifax continues to issue more data breach notices, now saying that 147.9 million records of personal information were stolen. They are not discovering more hacked computers, rather they are waiting for forensics efforts to demonstrate that records were transferred off the hacked computers. Equifax is not trying to protect its customers. It is a company working to save its image.

Whenever a computer is breached, the breach must be reported to the owners of the sensitive data on the machine. The only way to avoid issuing breach reports is if there was no sensitive data on the hacked computer.


defendIT image

defendIT. AI-driven security measures derived from security incident data.


Business Articles

Cascading Data Breaches
Rapid Containment of Intrusions







INC Logo




What Is New? | Contact | Tips


© 2015, 2016, 2017, 2018 Intrepid Net Computing. All rights reserved.