KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Equifax Freeze PINs Aren’t As Secure As They Could Be

Equifax Freeze PINs Aren’t As Secure As They Could Be

The Equifax data breach has been a considerable issue for countless individuals, exposing sensitive information that could lead to identity theft and so much more. In response to this breach, some experts are recommending that consumers go as far as freezing their credit lines because of the potential for breaches. Well, it all comes down to a PIN--something that can be easily guessed by a hacker under the right circumstances.

Personal identification numbers--contrary to popular belief--are the exact same thing as passwords. They are codes designed to keep someone from accessing sensitive information. However, access control devices like this need to follow the same guidelines, regardless of what they are called. They need to be complex and secure so as to keep hackers from guessing them. You should include both upper and lower-case letters, numbers, and symbols, and include them in a seemingly random order.

You’re probably thinking, “Great. Now I know enough to make my Equifax PIN as strong as possible.” Except… that’s not how this works.

Due to the way that Equifax generates your PIN, your credit lines could be placed at risk. The PINs used by Equifax are ten digits long, stemming from the date that the credit line was frozen, as well as the specific time which it was frozen. The order of these variables is the following: DdMmYyHhMm. This significantly cuts down on the amount of possible combinations available for a PIN. Furthermore, there are only a certain number of reasonable times within a day where you could apply for a credit line freeze, further limiting the amount of potential variables including the access code.

If Equifax had kept it a simple ten-digit randomized string of numbers, this wouldn’t be an issue. But that’s just not how the cookie crumbled.

As of September 11th, 2017, Equifax has addressed that this PIN generation process needs to be changed. Hopefully, the change will be enough to secure people’s sensitive information properly.

What are your thoughts about this development? Are you certain that your passwords and PINs are secure enough to protect your organization (and your identity) from being compromised? For assistance securing your personal and organizational information, reach out to KT Connections at 605-341-3873.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Email Business Computing Cloud Internet hackers malware Network Security Google software Efficiency Backup Business Data Ransomware Microsoft User Tips Computer Android Managed IT Services Smartphone Small Business Windows Hosted Solutions Mobile Device Management Productivity IT Support Network IT Support Money Facebook Business Continuity Hardware Windows 10 Mobile Devices Cloud Computing Data Management Operating System Data storage Encryption Upgrade Alert BDR security cameras IT Management Disaster Recovery Phishing Bandwidth IT Services Antivirus End of Support data breach communications Apple Unified Communications Social Media Microsoft Office Internet of Things Outlook Gmail Outsourced IT Business Management Passwords VoIP Politics Google Wallet App Save Money Data Backup SaaS Customer Service Saving Money Legal Information Technology Search IBM Google Maps Artificial Intelligence Networking cybersecurity Big Data Drones Start Menu The Internet of Things Apps History BYOD Hard Drive Events vulnerability Word Windows 10 security solutions Innovation WiFi Event Marketing Local Buzz Managed IT Services Law Enforcement Server YouTube Firewall Robot Smartphones South Dakota Best Practice Productivity Nextiva Automation Scam Spam Communication Lunch and Learn Data Recovery IoT appointment media experience Business Comunications IT for Oil Companies Browser Printer Office VPN Laptop Virtual Desktop Press Release Tablets Remote Monitoring Password Microsoft Office 365 features Tech Terms Vendor Mangement Office 365 information Google Docs Touchscreen Risk Management Document Management Webcam Vendor Management Tablet Digital Access Control botnet attack Business Mangement camera Kaseya Penetration Testing Microsoft Bookings Flash Cryptocurrency Websites Monitors Patch Management SOX Access Remote Computing enterprise productivity software Data Security botnet Hosted Solution macbook Kaseya Connect Phishing Scams Information Security booking process Settings Cleaning Hack Software as a Service Hacking Displays Redundancy Sarbanes-Oxley Act Spyware Computer Care password manager LastPass Audit DDoS attacks Google Drive Conference IT Consultation Email Security Event Workplace Tips Virus Project Management End User Testing Solid State Drive Proactive IT Analytics Running Cable Chamber of Commerce Fast food user confidence Bluetooth Maintenance Social Quick Tips Telephony Uninterrupted Power Supply DDoS News security precautions IT Assessment Gadgets Mixer Office Tips Law IT Managed Service Provider Education Music Cache Cabling Safety Fortinet VoIP Data Protection Experience IT Strategy Vendors Lawyers Writing Emergency Update Government LastPass Business Security How To Corporate Profile Sports Programming Administration Community Involvement communication device Wireless Technology IT Solutions Business Technology LiFi Black Market Communications Worker face Rebrand Virtual Reality Printing Time Management Cloud Backup Rapid City Streaming Media File Sharing Download business owner Society Attorneys Retail Disaster Visible Light Communication Phone System Web Servers surveillance cameras Applications Local Technology Memory Content Filtering Unified Threat Management Virtual Machines Managed Services IoT Devices Windows XP Workers healthcare Physical Security communication solutions Windows 8 vulnerabilities Website Business Growth Hardware as a Service Internet 101 Trend Micro Tips and Tricks Sales Tax Virtualization Collaboration identity theft Managed IT Network Congestion Risk Creep Compliance AtomBombing Deep Learning Samsung tool Tech Support Dell ’s Sonicwall Global Management System Microsoft Office 365 Knowledge Advertising HaaS Google Play Store Internet Connected Devices IT service Web Server G Suite Computer Malfunction Travel Processors Work/Life Balance Employer-Employee Relationship Meetings Messenger Mobility Ordinary Computers Sync Private Cloud Microchip Emails Wi-Fi collaboration capabilities Books Tracking quantum computers In Internet of Things Motion Sickness Budget Supercomputer Documents Reading Machine Learning Hiring/Firing Text Messaging IT Consultant PDF Bring Your Own Device Relocation network security professionals Computing Administrator Hacker Training Playbook Language base infrastructure Hacks Employer Employee Relationship Automobile Holiday Digital Payment Users breach methods Miscellaneous security solution Unified Threat Management Phone Systen Notifications Business Metrics Social Engineering end-of-support date Public Cloud Taxes holiday season Chromebook Telephone Systems Rental Service Flexibility CrashOverride Paperless Office UTM holidays Health Cortana Banking Downloads Reliable Computing Threat management 3D Printing scammers Twitter Distributed Denial of Service Scalability Marketing CCTV Cost Management scams