KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Equifax Freeze PINs Aren’t As Secure As They Could Be

Equifax Freeze PINs Aren’t As Secure As They Could Be

The Equifax data breach has been a considerable issue for countless individuals, exposing sensitive information that could lead to identity theft and so much more. In response to this breach, some experts are recommending that consumers go as far as freezing their credit lines because of the potential for breaches. Well, it all comes down to a PIN--something that can be easily guessed by a hacker under the right circumstances.

Personal identification numbers--contrary to popular belief--are the exact same thing as passwords. They are codes designed to keep someone from accessing sensitive information. However, access control devices like this need to follow the same guidelines, regardless of what they are called. They need to be complex and secure so as to keep hackers from guessing them. You should include both upper and lower-case letters, numbers, and symbols, and include them in a seemingly random order.

You’re probably thinking, “Great. Now I know enough to make my Equifax PIN as strong as possible.” Except… that’s not how this works.

Due to the way that Equifax generates your PIN, your credit lines could be placed at risk. The PINs used by Equifax are ten digits long, stemming from the date that the credit line was frozen, as well as the specific time which it was frozen. The order of these variables is the following: DdMmYyHhMm. This significantly cuts down on the amount of possible combinations available for a PIN. Furthermore, there are only a certain number of reasonable times within a day where you could apply for a credit line freeze, further limiting the amount of potential variables including the access code.

If Equifax had kept it a simple ten-digit randomized string of numbers, this wouldn’t be an issue. But that’s just not how the cookie crumbled.

As of September 11th, 2017, Equifax has addressed that this PIN generation process needs to be changed. Hopefully, the change will be enough to secure people’s sensitive information properly.

What are your thoughts about this development? Are you certain that your passwords and PINs are secure enough to protect your organization (and your identity) from being compromised? For assistance securing your personal and organizational information, reach out to KT Connections at 605-341-3873.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 16 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices hackers Privacy Technology Email Internet malware Business Computing Cloud Network Security Google software Efficiency User Tips Ransomware Business Backup Data Microsoft IT Support Computer Network Gmail Android Money Managed IT Services Facebook Hardware cybersecurity Smartphone Small Business Windows Hosted Solutions Mobile Device Management VoIP Productivity IT Support IT Management Operating System Business Continuity Artificial Intelligence Mobile Devices Cloud Computing Phishing communications Data Management Microsoft Office Outsourced IT Passwords Communication Data storage Upgrade Encryption IT Services security cameras BDR Disaster Recovery Alert Windows 10 Bandwidth data breach End of Support Apple Nextiva Antivirus Windows 10 Business Management Update Unified Communications Smartphones Social Media Outlook Internet of Things Data Backup Politics Access Control Automation App Office 365 Patch Management Spam Cost Management Collaboration IoT Google Wallet Browser Remote Monitoring Project Management Google Docs Analytics Legal Save Money Saving Money Customer Service Document Management SaaS Information Technology Search IBM Google Maps Server Hard Drive Drones Networking security solutions Big Data Start Menu History The Internet of Things Apps Firewall BYOD Productivity News Gadgets vulnerability Events Scam Innovation Lunch and Learn Managed IT Services Data Recovery Law Enforcement Word Event Marketing Robot WiFi Local Buzz YouTube Best Practice South Dakota appointment Memory Society Digital Streaming Media Rapid City File Sharing Web Servers Applications communication solutions Business Mangement Visible Light Communication Websites Business Growth Penetration Testing Virtual Machines Local Technology vulnerabilities Specifications Workers Virtualization Physical Security identity theft Windows 8 Network Congestion Access Windows XP IoT Devices Internet 101 Tips and Tricks Data Security Deep Learning Webcam Website Microsoft Office 365 Software as a Service Phishing Scams botnet attack Compliance Risk Creep camera Sales Tax Dell ’s Sonicwall Global Management System Television Samsung Microsoft Bookings media experience Redundancy Tech Support Spyware Advertising Budget Remote Computing Internet Connected Devices Audit Office Google Drive Microsoft Office 365 features Virus IT Consultation botnet IT for Oil Companies macbook Password Mouse Tablets booking process information Printer Hack Virtual Desktop Laptop Maintenance Vendor Management Telephony Law IT IT Assessment DDoS attacks Risk Management Mobility SharePoint Event Flash Managed Service Provider Cache Tablet Solid State Drive enterprise productivity software Fortinet Monitors VoIP IT Security Lawyers Cryptocurrency Hosted Solution IT Strategy Kaseya DDoS security precautions Mixer Settings Emergency SOX Business Security Displays Freedom of Information IT Solutions Cleaning Administration Kaseya Connect Information Security password manager LastPass Vendors Computer Care Business Technology Hacking Workplace Tips Communications Sarbanes-Oxley Act Time Management Proactive IT Fast food Printing Fake News Bluetooth Attorneys Quick Tips How To Conference Social Engineering Email Security user confidence Running Cable Community Involvement Chamber of Commerce Disaster Office Tips Phone System End User Testing Unified Threat Management Social Music Uninterrupted Power Supply face Downloads Microsoft Excel Safety Managed Services Cabling Download Hardware as a Service Education Experience Data Protection surveillance cameras Government Google Calendar Writing Content Filtering LastPass healthcare communication device Knowledge HaaS Business Comunications Black Market Sports Corporate Profile Trend Micro Virtual Reality Business Communications VPN Wireless Technology Press Release Managed IT Programming AtomBombing Worker tool Rebrand business owner Tech Terms Vendor Mangement Distributed Denial of Service LiFi Touchscreen Cloud Backup Google Play Store Comparison Retail Banking Paperless Office G Suite Travel Processors Computer Malfunction 3D Printing Employer-Employee Relationship Sync Messenger Private Cloud Microchip CCTV In Internet of Things Books Marketing Work/Life Balance Motion Sickness Web Server IT service Reading Machine Learning Hiring/Firing Meetings Ordinary Computers collaboration capabilities Bring Your Own Device Wi-Fi Relocation Emails Administrator Hacker quantum computers Documents Tracking Phone Systen base infrastructure Hacks Supercomputer Text Messaging PDF Automobile Holiday Computing security solution Unified Threat Management Notifications IT Consultant Business Metrics network security professionals CrashOverride end-of-support date Language holiday season Training Chromebook Playbook Rental Service Flexibility Miscellaneous UTM holidays Employer Employee Relationship Cortana breach methods Users Digital Payment Reliable Computing Threat management scammers Twitter Taxes Public Cloud Telephone Systems Scalability scams Health