• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Equifax Fallout Proves Security Is No Longer Just An IT Concern

“My advice is for business leaders to get involved now or be prepared to face the music later.” Tom Clerici, Arraya’s Cyber Security Practice Director, wrote those words to cap off his most recent blog post, entitled “All CEOs Should Pay Attention to Equifax Firings – They May Be Next.” In the post, Tom theorized that the fallout from catastrophic data breaches – such as the one still unfolding at Equifax – could soon escape the boundaries of IT and sting those on the business side who previously assumed immunity. It didn’t take long for Tom’s prediction to come true.

Roughly a week after his post was published, Equifax CEO Richard Smith announced his “retirement” following twelve years on the company’s leadership team. Smith joined David Webb (the company’s now ex-Chief Information Officer) and Susan Mauldin (its former Chief Security Officer) as newly minted “retirees.” The trio was seemingly jettisoned following the company’s devastating data breach that left the personal information of more than 145 million Americans, information such as social security numbers, address, phone number, and more, exposed. Despite the terminology used to define his departure, Smith wasn’t headed for a beach and a drink served in a pineapple. Instead, he had a series of dates with a Congress eager for a punching bag.

Smith’s apology tour began with a three-hour grilling by the House Energy and Commerce Committee, the members of which were all too happy to pepper Smith and Equifax with verbal barbs. Things didn’t get any easier when Smith switched chambers and appeared before the Senate’s Banking Committee the following day.

Here are some of the highlights – or lowlights depending on your perspective – of Smith’s appearances:

  • Joe L. Barton (R-TX) called for federal legislation to “put some teeth” into the penalties levied on companies who suffer a data breach by charging them thousands of dollars per record compromised.
  • Elizabeth Warren (D-MA) lambasted Smith, saying “when companies like Equifax mess up, senior executives like you should be held personally accountable and the company should pay mandatory and severe financial penalties for every consumer record that’s stolen.”
  • Greg Walden (R-OR) lamented his inability to “pass a law that, excuse me for saying, fixes stupid.”

Next Steps: Making security everyone’s business

Harsh words, however, it’s hard to feel too badly for Smith, who appears set to take home a sizeable amount in long-term bonus money according to a report by Bloomberg. There are a couple of key points contained above that likely jumped out to anyone in the business of handing and securing sensitive data. The comments from Rep. Barton and Sen. Warren seemed to suggest that the government should play a more active role in encouraging better cyber security postures. These statements could indicate stiffer fines could be on the way for organizations that fail in their obligation to keep data safe. Any such threat to the bottom line could succeed in helping another part of Tom’s blog become a reality. In it, he wrote:

“There is a misconception in many organizations that IT owns security and it’s solely their job to keep the bad guys out. That approach is fundamentally flawed and gives executive leadership an easy pass to blame the CIO and CISO when a breach happens… The last time I checked just about everyone uses technology today. The first thing most employees do when they get to the office is log into a computer. In essence, EVERYONE is a part of the IT department.”

Don’t wait for Congress to swing their legislative hammer. Arraya’s Cyber Security team can serve as a bridge between IT and the business. Our team is skilled at aligning security initiatives with organizational goals, ensuring real, meaningful progress. This way, regardless of what Congress elects to do, all sides of the business can come together in order to ensure their data is safe.

Continue the security conversation with Arraya today by reaching out to our team at: https://www.arrayasolutions.com//contact-us/. Leave us a comment on this or any of our blog posts through social media. Find us on LinkedIn, Twitter, and Facebook. While you’re there, be sure to follow us to keep up with our latest industry insights and exclusive learning opportunities.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}