Edlong Corporation Data Breach Exposes Social Security Numbers

Will Gendron
Editor in Chief
Published
May 17, 2024
Updated
December 27, 2024
Edlong Corporation Data Breach Exposes Social Security Numbers
The Edlong Corporation
Types of INFORMATION affected
  • Names
    Names
  • Social security numbers
    Social Security Numbers
  • Dates of birth
    Dates of Birth
  • Addresses
    Addresses
  • Government IDs
    Government IDs
  • Medical Information
    Medical Info
  • Financial Info
    Financial Info

The April 2024 Cybersecurity Incident

On April 21, 2024, Edlong Corporation experienced a significant disruption in its network environment, which was later identified as a cybersecurity incident. The company detected this disruption promptly and took immediate action to secure its systems. An extensive investigation was launched with the assistance of independent IT security and forensic experts to ascertain the extent of the breach and to identify any personal information that might have been compromised.

Information Exposed

During the forensic investigation, it was determined that the following types of consumer information might have been exposed:

  • Name
  • Mailing address
  • Date of birth
  • Social Security number

It is important to note that the exposed information varied per individual, meaning not all listed data points were compromised for every person affected.

Edlong's Response

In response to the data breach, Edlong Corporation has taken several robust measures to enhance the security of its information systems and prevent future incidents. The company has engaged external cybersecurity experts to implement additional safeguards and has upgraded its security protocols. Edlong has also revised its policies and procedures related to system security and information lifecycle management.

Furthermore, Edlong is offering affected individuals complimentary access to Single Bureau Credit Monitoring, Credit Report, and Credit Score services for 24 months. These services are provided by Cyberscout, a TransUnion company, and include proactive fraud assistance. To enroll in these services, affected individuals should visit Cyberscout's Activation Page and follow the provided instructions.

Steps to Take if You Are Affected

Given the nature of the data exposed, it is crucial for affected individuals to remain vigilant and proactive in monitoring their personal information. Here are several steps you can take:

  1. Enroll in the provided credit monitoring service to receive alerts of any changes to your credit file.
  2. Obtain a free copy of your credit report from each of the three major credit reporting agencies at AnnualCreditReport.com.
  3. Consider placing a security freeze on your credit reports, which prevents creditors from accessing your credit report entirely, thereby inhibiting the opening of new accounts in your name. More information on how to place a security freeze can be found on the websites of the major credit bureaus: Equifax, Experian, and TransUnion.
  4. Set up fraud alerts with the three credit bureaus so that you are notified if someone attempts to apply for credit in your name.

By taking these steps, you can help safeguard your personal information and respond quickly to any signs of fraudulent activity.

For additional support, affected individuals can contact the Edlong help line at 1-800-405-6108, available Monday through Friday from 8:00 a.m. to 8:00 p.m. Eastern Time, to speak with a fraud specialist.

Notice to Consumers: For more detailed information, please refer to the full Notice of Data Security Incident provided by Edlong Corporation.

Notice Letter

This browser does not support inline PDFs. Please download the PDF to view it: Download PDF

Affected Entity
The Edlong Corporation
Consumers Notification date
Date of Breach
Breach Discovered Date
Total People Affected
Information Types Exposed
- Name - Mailing address - Date of birth - Social Security number

Join the

The Edlong Corporation

data breach lawsuit. It's free to join. 

Join the Lawsuit
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image