Business > CASE STUDY > MBA 635 Case Study Equifax Data Breach| Case Study: Equifax Data Breach Southern (All)

MBA 635 Case Study Equifax Data Breach| Case Study: Equifax Data Breach Southern

Document Content and Description Below

MBA_635_ Case Study Equifax Data Breach.docx Case Study: Equifax Data Breach Southern New Hampshire University Compliance When news broke that Equifax had been hacked and millions of consumers... had their personal information exposed, details came out showing Equifax™s many different compliance issues. Some of the compliance issues included poor patch management, gaps in accountability among management, and outdated technology. Equifax™s many lapses in patch upgrades, even after an assessment had identified specific patches that needed to be applied, were a severe oversight that resulted in the degradation of security for their data. In response to this compliance issue, Equifax has established a procedure to, œConduct annual assessments of internal and external security risks and implement safeguards to address potential risks, such as patch management and security remediation policies, network intrusion mechanisms, and other protections (Jaeger, 2019). When the review of the security lapse showed gaps in Equifax™s organizational structure that siloed the Security Team from the IT Team, Equifax elected to œDesignate an employee to oversee the information-security program (Jaegar, 2019). By relying on a specific individual to ensure IT security is being maintained, they reinforce their organizational structure to reduce the siloing between teams. Finally, to combat the outdated technology that Equifax had relied upon previously, Equifax changed its software technology method so that they could, œMinimize its colle. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [Show More]

Last updated: 2 years ago

Preview 1 out of 9 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$7.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

51
0

Document information


Connected school, study & course


About the document


Uploaded On

Oct 03, 2022

Number of pages

9

Written in

Seller


seller-icon
helperatsof1

Member since 4 years

48 Documents Sold

Reviews Received
1
0
0
0
2
Additional information

This document has been written for:

Uploaded

Oct 03, 2022

Downloads

 0

Views

 51

Document Keyword Tags

Recommended For You

Get more on CASE STUDY »

$7.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·