
How does Equifax stack up?

Yahoo

MySpace

EBay

Equifax


Target

Heartland Payment Systems

Sony

AOL

JPMorgan Chase

EDGAR
"Malicious attacks and intrusion efforts are continuous and evolving, and in certain cases they have been successful at the most robust institutions and at the SEC itself," said SEC Chairman Jay Clayton in a statement acknowledging the hack. "Cybersecurity efforts must include, in addition to assessment, prevention and mitigation, resilience and recovery."