Equifax: 400k UK accounts ‘may be compromised’

Equifax has confirmed that the personal information of around 400,000 UK consumers may have been breached in its recent US cyber attack – which has also now seen the company’s CIO and CSO step down.

The Equifax statement said that while UK systems were not affected by the US attack, a file containing UK consumer information may potentially have been accessed. This was due to a process failure, corrected in 2016, which led to a limited amount of UK data being stored in the US between 2011 and 2016.

The information was restricted to name, date of birth, email address and a telephone number. Equifax confirmed that the data does not include any residential address information, password information or financial data. Having concluded the initial assessment, Equifax established that it is likely to need to contact the affected consumers in order to offer them appropriate advice and a range of services to help safeguard and reassure them.

Equifax will also incorporate web and social media monitoring alerts for those affected, and provide links to services provided by other UK regulated organisations which these consumers may prefer to take up in addition to or instead of the free services provided by Equifax.

Patricio Remon, president at Equifax, said: “We apologise for this failure to protect UK consumer data. Our immediate focus is to support those affected by this incident and to ensure we make all of the necessary improvements and investments to strengthen our security and processes going forward.”

Following the breach in July – which only came to light earlier this month – Equifax’s chief information officer, David Webb, and chief security, Susan Mauldin, also announced on Friday that they will be retiring from the company.

Commenting on the news, Dan Panesar, vice president EMEA at security specialists Certes Networks, said: “As the fall-out of the Equifax breaches continues, it is ever more apparent that not only is maintaining traditional approaches to cyber security an open invitation to hackers, but also that the mindset of most CIOs and CISOs needs to change.

“It’s all good and well having the buck stop with the CIO when a breach occurs, but when are boards going take a holistic view of their risk profile, and empower dedicated security teams working under the supervision of the CIO to have full control over policy and implementation?”

    Share Story:

Recent Stories


Safeguarding economies: DNFBPs' role in AML and CTF compliance explained
Join FStech editor Jonathan Easton, NICE Actimize's Adam McLaughlin and Graham Mackenzie of the Law Society of Scotland as they look at the role Designated Non-Financial Businesses and Professions (DNFBPs) play in the financial sector, and the challenges they face in complying with anti-money laundering and counter-terrorist financing regulations.

Ransomware and beyond: Enhancing cyber threat awareness in the financial sector
Join FStech editor Jonathan Easton and Proofpoint cybersecurity strategist Matt Cooke as they discuss the findings of the State of the Phish 2023 report, diving into key topics such as awareness of cyber threats, the sophisticated techniques being used by criminals to target the financial sector, and how financial institutions can take a proactive approach to educating both their employees and their customers.

Click here to read the 2023 State of the Phish report from Proofpoint.

Cracking down on fraud
In this webinar a panel of expert speakers explored the ways in which high-volume PSPs and FinTechs are preventing fraud while providing a seamless customer experience.

Future of Planning, Budgeting, Forecasting, and Reporting
Sage Intacct is excited to present FSN The Modern Finance Forum’s “Future of Planning, Budgeting, Forecasting, and Reporting Global Survey 2022” results. With participation from 450 companies around the globe, the survey results highlight how organisations are developing their core financial processes by 2030.