SlideShare a Scribd company logo
OOPs…Epsilon had a Data Breach….What does this mean to YOU?(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
FACTSEpsilon is a large email marketing company.When you receive emails from banks, recruiting companies, stores, and other organizations, there is a HIGH likelihood it is originating at Epsilon.Epsilon has reported that EMAIL addresses were stolenEpsilon is not able to confirm if EMAIL was all that was taken(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Who CARES??You should.  And here is why:It’s GREAT (for Epsilon) if ONLY email addresses were stolen, however those email accounts were stored in a database that tracked who Epsilon’s clients were, so the hackers likely also have the companies you have relationships with (Chase, JP Morgan, Best Buy, Walgreens, Robert Half Recruiters, Target, Disney, and MANY others…..)NOTE:  We ALL need to be aware of how companies handle private information, otherwise it can be used against us!(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
So what….The hackers want the rest of your information (IF they don’t have it already) ……..and will be  attacking you for it.3 Types of emails you may see: Vendor EmailCompetitor EmailThird-Party Email(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Email 1: From the VendorAn email from the hackers, disguised as an email from the vendor apologizing and asking you to: Create a new account Change your password Confirm your email address Sign up for free protection serviceSomething elseIn the email, it will say “click here” or “click this link”– DO NOT “click here”!)(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Email 2: From a CompetitorAn email form the hackers, disguised as an email from the vendor’s competitor.(example ONLY: from Wal-Mart b/c they do not appear to have been affected by this breach) This email will discuss the recent breach and how their organization takes “extra” precautions and that they know consumers are concerned.They will be offering something (maybe a 20% discount) for first time buyers to try them out.  In the email, it will say “click here” or “click this link”– DO NOT “click here”!)(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Email 3: From a Third Party These emails will be from the hackers, disguised as one from: Government Trade Association ISP Web Domain Hosting Company Law Firm leading a class action lawsuit against Epsilon et al. It will say something like:“We are contacting you to verify/assure you/ask you to participate.  If your name is on the list attached, there are funds available to protect your data.  This is free money you can use to pay bills, change your email address, or buy updated antivirus software….” (whatever it is, it will be some offer or call to action) In the email, it will say “click here” or “click this link”– DO NOT “click here”!)(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
The BEST viruses and wormsExist on the computer without you even knowing. The second you click the link or open the attachment, expect your data to be shared.Which data?Passwords User NamesCredit Card and Banking InformationDocumentsPictures & VideosAnything else the hackers want(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
How to Protect Yourself & Your DataSet up an brand new email address at Gmail.  Visit the websites of the retailers you  frequent. NOTE: Anyplace you have an account.Log in and change the existing email address they have on file to this new email address you just created. Update your Anti-Virus, Anti-Spyware software.  Run a full scan of your computer system and network.Download TrueCrypt and encrypt your files so only YOU can open them.  NOTE:  READ the directions with the program and TEST on a file first so you don’t lose anything critical.Back-up all of your documents and files (don’t forget iTunes and Pictures!).  I’d suggest Carbonite, Mozy, or SugarSync for remote backup service. Proactively monitor your network – check computer processes, check firewall logs, educate employees – or use a service like Active Network Monitoring by The Lorenzi GroupFinally, remember, this is not an all-inclusive list of things to do or order to do them in.  This information is meant to be a helpful guide to get you started on the right track.  The Lorenzi Group is not responsible for any losses or negative affects from you taking any, all, or none of these steps to protect your data(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
ResourcesEpsilon – www.epsilon.comGmail – mail.google.comAVG – free.avg.comAvira– www.avira.comTruCrypt - www.truecrypt.orgCarbonite - www.carbonite.comMozy - www.mozy.comSugarSync - www.sugarsync.comFCC – www.fcc.orgThe Lorenzi Group866-632-9880 x123 info@thelorenzigroup.comwww.thelorenzigroup.com(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved

More Related Content

PDF
My E-mail appears as spam | The 7 major reasons | Part 5#17
PPTX
Spam attacks
PPTX
Social Media Risk Management – Part 2
PDF
Avoiding IRS Scams during Tax Season
PPT
Internet Misuse inside the Company
PPTX
Campaign for accountability national poll results 062518 2
PPSX
What Are My Risks
PPTX
Business org
My E-mail appears as spam | The 7 major reasons | Part 5#17
Spam attacks
Social Media Risk Management – Part 2
Avoiding IRS Scams during Tax Season
Internet Misuse inside the Company
Campaign for accountability national poll results 062518 2
What Are My Risks
Business org

Similar to Introduction to the Epsilon Data Breach (20)

PPT
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
PPTX
CYBER_SECURITY_BASICS_FINAL.pptx
PPT
Social Engineering: Protecting Yourself on the Campus Network
PPT
Protecting Yourself Online
PPTX
I’ve Been Hacked  The Essential Steps to Take Next
PPTX
I’ve been hacked  the essential steps to take next
PDF
Email marketing the easy way
PDF
Did you get my email?
PPTX
Artifacts... that's the name of the game! avengercon - nov 2018
DOC
Intellix Systems
DOCX
SpyFly Background Checks Services Help Center
DOCX
Email Marketing The Easy Way
PDF
Reta email blast anthem
PPTX
Stacy Robin - The Degania Group - Technology and the Law
PPSX
IDENTIFYING CYBER THREATS NEAR YOU
PPTX
Email marketing masterclass june 2013
PDF
Data breaches - How well is your organization protected against them?
PDF
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
PDF
Email Inbox Troubleshooting Guide
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBER_SECURITY_BASICS_FINAL.pptx
Social Engineering: Protecting Yourself on the Campus Network
Protecting Yourself Online
I’ve Been Hacked  The Essential Steps to Take Next
I’ve been hacked  the essential steps to take next
Email marketing the easy way
Did you get my email?
Artifacts... that's the name of the game! avengercon - nov 2018
Intellix Systems
SpyFly Background Checks Services Help Center
Email Marketing The Easy Way
Reta email blast anthem
Stacy Robin - The Degania Group - Technology and the Law
IDENTIFYING CYBER THREATS NEAR YOU
Email marketing masterclass june 2013
Data breaches - How well is your organization protected against them?
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
Email Inbox Troubleshooting Guide
Ad

More from The Lorenzi Group (20)

PPTX
Data Breach from the Inside Out
PPTX
ROAR in Real Like: Heartbeat Helper
PPTX
ROAR for IT Managers
PPTX
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
PPTX
The Many Faces of SHIELD
PPT
ROAR Provides Peace of Mind in Digital Enviroments
PPTX
ROARing Compliance
PPTX
ROAR in Real Life: Picture Perfect
PPTX
ROAR in Pictures: Biking
PPTX
DDoS Explained
PPTX
Digital Forensics: The Employees' Dilemma
PPTX
Rising Cost of Child Porn Defense
PPTX
Security Analytics for Certified Fraud Examiners
PPTX
So, You Want To Work In Digital Forensics....
PPTX
Digital Forensics: Yesterday, Today, and the Next Frontier
PPTX
Digital Forensics & eDiscovery for the Financial Executive
PPTX
Digital Forensics, eDiscovery & Technology Risks for HR Executives
PPTX
eDiscovery IS Data Security
ODP
Active Network Monitoring brings Peace of Mind
PPT
Sex, Crime, & Online Slime
Data Breach from the Inside Out
ROAR in Real Like: Heartbeat Helper
ROAR for IT Managers
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
The Many Faces of SHIELD
ROAR Provides Peace of Mind in Digital Enviroments
ROARing Compliance
ROAR in Real Life: Picture Perfect
ROAR in Pictures: Biking
DDoS Explained
Digital Forensics: The Employees' Dilemma
Rising Cost of Child Porn Defense
Security Analytics for Certified Fraud Examiners
So, You Want To Work In Digital Forensics....
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics & eDiscovery for the Financial Executive
Digital Forensics, eDiscovery & Technology Risks for HR Executives
eDiscovery IS Data Security
Active Network Monitoring brings Peace of Mind
Sex, Crime, & Online Slime
Ad

Recently uploaded (20)

PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PPT
Chapter four Project-Preparation material
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPT
Data mining for business intelligence ch04 sharda
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PPTX
5 Stages of group development guide.pptx
PDF
Chapter 5_Foreign Exchange Market in .pdf
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
Laughter Yoga Basic Learning Workshop Manual
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
How to Get Business Funding for Small Business Fast
PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
Training And Development of Employee .pdf
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
Chapter four Project-Preparation material
Belch_12e_PPT_Ch18_Accessible_university.pptx
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Data mining for business intelligence ch04 sharda
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
5 Stages of group development guide.pptx
Chapter 5_Foreign Exchange Market in .pdf
HR Introduction Slide (1).pptx on hr intro
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Probability Distribution, binomial distribution, poisson distribution
Laughter Yoga Basic Learning Workshop Manual
Reconciliation AND MEMORANDUM RECONCILATION
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
How to Get Business Funding for Small Business Fast
WRN_Investor_Presentation_August 2025.pdf
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Training And Development of Employee .pdf
340036916-American-Literature-Literary-Period-Overview.ppt

Introduction to the Epsilon Data Breach

  • 1. OOPs…Epsilon had a Data Breach….What does this mean to YOU?(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 2. FACTSEpsilon is a large email marketing company.When you receive emails from banks, recruiting companies, stores, and other organizations, there is a HIGH likelihood it is originating at Epsilon.Epsilon has reported that EMAIL addresses were stolenEpsilon is not able to confirm if EMAIL was all that was taken(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 3. Who CARES??You should. And here is why:It’s GREAT (for Epsilon) if ONLY email addresses were stolen, however those email accounts were stored in a database that tracked who Epsilon’s clients were, so the hackers likely also have the companies you have relationships with (Chase, JP Morgan, Best Buy, Walgreens, Robert Half Recruiters, Target, Disney, and MANY others…..)NOTE: We ALL need to be aware of how companies handle private information, otherwise it can be used against us!(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 4. So what….The hackers want the rest of your information (IF they don’t have it already) ……..and will be attacking you for it.3 Types of emails you may see: Vendor EmailCompetitor EmailThird-Party Email(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 5. Email 1: From the VendorAn email from the hackers, disguised as an email from the vendor apologizing and asking you to: Create a new account Change your password Confirm your email address Sign up for free protection serviceSomething elseIn the email, it will say “click here” or “click this link”– DO NOT “click here”!)(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 6. Email 2: From a CompetitorAn email form the hackers, disguised as an email from the vendor’s competitor.(example ONLY: from Wal-Mart b/c they do not appear to have been affected by this breach) This email will discuss the recent breach and how their organization takes “extra” precautions and that they know consumers are concerned.They will be offering something (maybe a 20% discount) for first time buyers to try them out. In the email, it will say “click here” or “click this link”– DO NOT “click here”!)(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 7. Email 3: From a Third Party These emails will be from the hackers, disguised as one from: Government Trade Association ISP Web Domain Hosting Company Law Firm leading a class action lawsuit against Epsilon et al. It will say something like:“We are contacting you to verify/assure you/ask you to participate. If your name is on the list attached, there are funds available to protect your data. This is free money you can use to pay bills, change your email address, or buy updated antivirus software….” (whatever it is, it will be some offer or call to action) In the email, it will say “click here” or “click this link”– DO NOT “click here”!)(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 8. The BEST viruses and wormsExist on the computer without you even knowing. The second you click the link or open the attachment, expect your data to be shared.Which data?Passwords User NamesCredit Card and Banking InformationDocumentsPictures & VideosAnything else the hackers want(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 9. How to Protect Yourself & Your DataSet up an brand new email address at Gmail. Visit the websites of the retailers you frequent. NOTE: Anyplace you have an account.Log in and change the existing email address they have on file to this new email address you just created. Update your Anti-Virus, Anti-Spyware software. Run a full scan of your computer system and network.Download TrueCrypt and encrypt your files so only YOU can open them. NOTE: READ the directions with the program and TEST on a file first so you don’t lose anything critical.Back-up all of your documents and files (don’t forget iTunes and Pictures!). I’d suggest Carbonite, Mozy, or SugarSync for remote backup service. Proactively monitor your network – check computer processes, check firewall logs, educate employees – or use a service like Active Network Monitoring by The Lorenzi GroupFinally, remember, this is not an all-inclusive list of things to do or order to do them in. This information is meant to be a helpful guide to get you started on the right track. The Lorenzi Group is not responsible for any losses or negative affects from you taking any, all, or none of these steps to protect your data(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 10. ResourcesEpsilon – www.epsilon.comGmail – mail.google.comAVG – free.avg.comAvira– www.avira.comTruCrypt - www.truecrypt.orgCarbonite - www.carbonite.comMozy - www.mozy.comSugarSync - www.sugarsync.comFCC – www.fcc.orgThe Lorenzi Group866-632-9880 x123 info@thelorenzigroup.comwww.thelorenzigroup.com(C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved