SlideShare una empresa de Scribd logo
1 de 10
OOPs…Epsilon had a Data Breach…. What does this mean to YOU? (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
FACTS Epsilon is a large email marketing company. When you receive emails from banks, recruiting companies, stores, and other organizations, there is a HIGH likelihood it is originating at Epsilon. Epsilon has reported that EMAIL addresses were stolen Epsilon is not able to confirm if EMAIL was all that was taken (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Who CARES?? You should.  And here is why: It’s GREAT (for Epsilon) if ONLY email addresses were stolen, however those email accounts were stored in a database that tracked who Epsilon’s clients were, so the hackers likely also have the companies you have relationships with (Chase, JP Morgan, Best Buy, Walgreens, Robert Half Recruiters, Target, Disney, and MANY others…..) NOTE:  We ALL need to be aware of how companies handle private information, otherwise it can be used against us! (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
So what…. The hackers want the rest of your information (IF they don’t have it already)  ……..and will be  attacking you for it. 3 Types of emails you may see:  Vendor Email Competitor Email Third-Party Email (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Email 1: From the Vendor An email from the hackers, disguised as an email from the vendor apologizing and asking you to:  Create a new account  Change your password  Confirm your email address  Sign up for free protection service Something else In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Email 2: From a Competitor An email form the hackers, disguised as an email from the vendor’s competitor. (example ONLY: from Wal-Mart b/c they do not appear to have been affected by this breach)  This email will discuss the recent breach and how their organization takes “extra” precautions and that they know consumers are concerned. They will be offering something (maybe a 20% discount) for first time buyers to try them out.   In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Email 3: From a Third Party  These emails will be from the hackers, disguised as one from:  Government  Trade Association  ISP  Web Domain Hosting Company  Law Firm leading a class action lawsuit against Epsilon et al.  It will say something like: “We are contacting you to verify/assure you/ask you to participate.  If your name is on the list attached, there are funds available to protect your data.  This is free money you can use to pay bills, change your email address, or buy updated antivirus software….” (whatever it is, it will be some offer or call to action)  In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
The BEST viruses and worms Exist on the computer without you even knowing.  The second you click the link or open the attachment, expect your data to be shared. Which data? Passwords User Names Credit Card and Banking Information Documents Pictures & Videos Anything else the hackers want (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
How to Protect Yourself & Your Data Set up an brand new email address at Gmail.   Visit the websites of the retailers you  frequent. NOTE: Anyplace you have an account. Log in and change the existing email address they have on file to this new email address you just created.  Update your Anti-Virus, Anti-Spyware software.  Run a full scan of your computer system and network. Download TrueCrypt and encrypt your files so only YOU can open them.  NOTE:  READ the directions with the program and TEST on a file first so you don’t lose anything critical. Back-up all of your documents and files (don’t forget iTunes and Pictures!).  I’d suggest Carbonite, Mozy, or SugarSync for remote backup service.  Proactively monitor your network – check computer processes, check firewall logs, educate employees – or use a service like Active Network Monitoring by The Lorenzi Group Finally, remember, this is not an all-inclusive list of things to do or order to do them in.  This information is meant to be a helpful guide to get you started on the right track.  The Lorenzi Group is not responsible for any losses or negative affects from you taking any, all, or none of these steps to protect your data (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Resources Epsilon – www.epsilon.com Gmail – mail.google.com AVG – free.avg.com Avira– www.avira.com TruCrypt - www.truecrypt.org Carbonite - www.carbonite.com Mozy - www.mozy.com SugarSync - www.sugarsync.com FCC – www.fcc.org The Lorenzi Group 866-632-9880 x123  info@thelorenzigroup.com www.thelorenzigroup.com (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved

Más contenido relacionado

Similar a Introduction to the Epsilon Data Breach

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxQuiMo3
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Networkthowell
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextBrian Pichman
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy wayDeepakYadav1095
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?Tayfun TEK
 
Artifacts... that's the name of the game! avengercon - nov 2018
Artifacts... that's the name of the game!   avengercon - nov 2018Artifacts... that's the name of the game!   avengercon - nov 2018
Artifacts... that's the name of the game! avengercon - nov 2018Fernando Tomlinson, CISSP, MBA
 
Intellix Systems
Intellix SystemsIntellix Systems
Intellix SystemsTea C.
 
SpyFly Background Checks Services Help Center
SpyFly Background Checks Services Help CenterSpyFly Background Checks Services Help Center
SpyFly Background Checks Services Help CenterSpyfly
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthemamason04
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawRamon Ray
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Cristina Collado
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Email Inbox Troubleshooting Guide
Email Inbox Troubleshooting GuideEmail Inbox Troubleshooting Guide
Email Inbox Troubleshooting GuideEmail Delivered
 

Similar a Introduction to the Epsilon Data Breach (20)

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?
 
Artifacts... that's the name of the game! avengercon - nov 2018
Artifacts... that's the name of the game!   avengercon - nov 2018Artifacts... that's the name of the game!   avengercon - nov 2018
Artifacts... that's the name of the game! avengercon - nov 2018
 
Intellix Systems
Intellix SystemsIntellix Systems
Intellix Systems
 
SpyFly Background Checks Services Help Center
SpyFly Background Checks Services Help CenterSpyFly Background Checks Services Help Center
SpyFly Background Checks Services Help Center
 
Email Marketing The Easy Way
Email Marketing The Easy WayEmail Marketing The Easy Way
Email Marketing The Easy Way
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthem
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the Law
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Email marketing masterclass june 2013
Email marketing masterclass june 2013Email marketing masterclass june 2013
Email marketing masterclass june 2013
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Email Inbox Troubleshooting Guide
Email Inbox Troubleshooting GuideEmail Inbox Troubleshooting Guide
Email Inbox Troubleshooting Guide
 

Más de The Lorenzi Group

Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out The Lorenzi Group
 
ROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat HelperROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat HelperThe Lorenzi Group
 
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...The Lorenzi Group
 
ROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsThe Lorenzi Group
 
ROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture PerfectROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture PerfectThe Lorenzi Group
 
Digital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' DilemmaDigital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' DilemmaThe Lorenzi Group
 
Rising Cost of Child Porn Defense
Rising Cost of Child Porn DefenseRising Cost of Child Porn Defense
Rising Cost of Child Porn DefenseThe Lorenzi Group
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersThe Lorenzi Group
 
So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....The Lorenzi Group
 
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next FrontierDigital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next FrontierThe Lorenzi Group
 
Digital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial ExecutiveDigital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial ExecutiveThe Lorenzi Group
 
Digital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesDigital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesThe Lorenzi Group
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindThe Lorenzi Group
 

Más de The Lorenzi Group (20)

Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out
 
ROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat HelperROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat Helper
 
ROAR for IT Managers
ROAR for IT ManagersROAR for IT Managers
ROAR for IT Managers
 
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
 
The Many Faces of SHIELD
The Many Faces of SHIELDThe Many Faces of SHIELD
The Many Faces of SHIELD
 
ROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital Enviroments
 
ROARing Compliance
ROARing ComplianceROARing Compliance
ROARing Compliance
 
ROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture PerfectROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture Perfect
 
ROAR in Pictures: Biking
ROAR in Pictures: BikingROAR in Pictures: Biking
ROAR in Pictures: Biking
 
DDoS Explained
DDoS ExplainedDDoS Explained
DDoS Explained
 
Digital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' DilemmaDigital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' Dilemma
 
Rising Cost of Child Porn Defense
Rising Cost of Child Porn DefenseRising Cost of Child Porn Defense
Rising Cost of Child Porn Defense
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
 
So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....
 
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next FrontierDigital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
 
Digital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial ExecutiveDigital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial Executive
 
Digital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesDigital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR Executives
 
eDiscovery IS Data Security
eDiscovery IS Data SecurityeDiscovery IS Data Security
eDiscovery IS Data Security
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
 
Sex, Crime, & Online Slime
Sex, Crime, & Online SlimeSex, Crime, & Online Slime
Sex, Crime, & Online Slime
 

Último

NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 

Último (20)

NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 

Introduction to the Epsilon Data Breach

  • 1. OOPs…Epsilon had a Data Breach…. What does this mean to YOU? (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 2. FACTS Epsilon is a large email marketing company. When you receive emails from banks, recruiting companies, stores, and other organizations, there is a HIGH likelihood it is originating at Epsilon. Epsilon has reported that EMAIL addresses were stolen Epsilon is not able to confirm if EMAIL was all that was taken (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 3. Who CARES?? You should. And here is why: It’s GREAT (for Epsilon) if ONLY email addresses were stolen, however those email accounts were stored in a database that tracked who Epsilon’s clients were, so the hackers likely also have the companies you have relationships with (Chase, JP Morgan, Best Buy, Walgreens, Robert Half Recruiters, Target, Disney, and MANY others…..) NOTE: We ALL need to be aware of how companies handle private information, otherwise it can be used against us! (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 4. So what…. The hackers want the rest of your information (IF they don’t have it already) ……..and will be attacking you for it. 3 Types of emails you may see: Vendor Email Competitor Email Third-Party Email (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 5. Email 1: From the Vendor An email from the hackers, disguised as an email from the vendor apologizing and asking you to: Create a new account Change your password Confirm your email address Sign up for free protection service Something else In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 6. Email 2: From a Competitor An email form the hackers, disguised as an email from the vendor’s competitor. (example ONLY: from Wal-Mart b/c they do not appear to have been affected by this breach) This email will discuss the recent breach and how their organization takes “extra” precautions and that they know consumers are concerned. They will be offering something (maybe a 20% discount) for first time buyers to try them out. In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 7. Email 3: From a Third Party These emails will be from the hackers, disguised as one from: Government Trade Association ISP Web Domain Hosting Company Law Firm leading a class action lawsuit against Epsilon et al. It will say something like: “We are contacting you to verify/assure you/ask you to participate. If your name is on the list attached, there are funds available to protect your data. This is free money you can use to pay bills, change your email address, or buy updated antivirus software….” (whatever it is, it will be some offer or call to action) In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 8. The BEST viruses and worms Exist on the computer without you even knowing. The second you click the link or open the attachment, expect your data to be shared. Which data? Passwords User Names Credit Card and Banking Information Documents Pictures & Videos Anything else the hackers want (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 9. How to Protect Yourself & Your Data Set up an brand new email address at Gmail. Visit the websites of the retailers you frequent. NOTE: Anyplace you have an account. Log in and change the existing email address they have on file to this new email address you just created. Update your Anti-Virus, Anti-Spyware software. Run a full scan of your computer system and network. Download TrueCrypt and encrypt your files so only YOU can open them. NOTE: READ the directions with the program and TEST on a file first so you don’t lose anything critical. Back-up all of your documents and files (don’t forget iTunes and Pictures!). I’d suggest Carbonite, Mozy, or SugarSync for remote backup service. Proactively monitor your network – check computer processes, check firewall logs, educate employees – or use a service like Active Network Monitoring by The Lorenzi Group Finally, remember, this is not an all-inclusive list of things to do or order to do them in. This information is meant to be a helpful guide to get you started on the right track. The Lorenzi Group is not responsible for any losses or negative affects from you taking any, all, or none of these steps to protect your data (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 10. Resources Epsilon – www.epsilon.com Gmail – mail.google.com AVG – free.avg.com Avira– www.avira.com TruCrypt - www.truecrypt.org Carbonite - www.carbonite.com Mozy - www.mozy.com SugarSync - www.sugarsync.com FCC – www.fcc.org The Lorenzi Group 866-632-9880 x123 info@thelorenzigroup.com www.thelorenzigroup.com (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved