This is a high-level introduction from The Lorenzi Group discussing the after-effects of the recent data breach at Epsilon. We cover what consumers and businesses need to be aware of and how they can begin to protect themselves.
1. OOPs…Epsilon had a Data Breach…. What does this mean to YOU? (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
2. FACTS Epsilon is a large email marketing company. When you receive emails from banks, recruiting companies, stores, and other organizations, there is a HIGH likelihood it is originating at Epsilon. Epsilon has reported that EMAIL addresses were stolen Epsilon is not able to confirm if EMAIL was all that was taken (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
3. Who CARES?? You should. And here is why: It’s GREAT (for Epsilon) if ONLY email addresses were stolen, however those email accounts were stored in a database that tracked who Epsilon’s clients were, so the hackers likely also have the companies you have relationships with (Chase, JP Morgan, Best Buy, Walgreens, Robert Half Recruiters, Target, Disney, and MANY others…..) NOTE: We ALL need to be aware of how companies handle private information, otherwise it can be used against us! (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
4. So what…. The hackers want the rest of your information (IF they don’t have it already) ……..and will be attacking you for it. 3 Types of emails you may see: Vendor Email Competitor Email Third-Party Email (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
5. Email 1: From the Vendor An email from the hackers, disguised as an email from the vendor apologizing and asking you to: Create a new account Change your password Confirm your email address Sign up for free protection service Something else In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
6. Email 2: From a Competitor An email form the hackers, disguised as an email from the vendor’s competitor. (example ONLY: from Wal-Mart b/c they do not appear to have been affected by this breach) This email will discuss the recent breach and how their organization takes “extra” precautions and that they know consumers are concerned. They will be offering something (maybe a 20% discount) for first time buyers to try them out. In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
7. Email 3: From a Third Party These emails will be from the hackers, disguised as one from: Government Trade Association ISP Web Domain Hosting Company Law Firm leading a class action lawsuit against Epsilon et al. It will say something like: “We are contacting you to verify/assure you/ask you to participate. If your name is on the list attached, there are funds available to protect your data. This is free money you can use to pay bills, change your email address, or buy updated antivirus software….” (whatever it is, it will be some offer or call to action) In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
8. The BEST viruses and worms Exist on the computer without you even knowing. The second you click the link or open the attachment, expect your data to be shared. Which data? Passwords User Names Credit Card and Banking Information Documents Pictures & Videos Anything else the hackers want (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
9. How to Protect Yourself & Your Data Set up an brand new email address at Gmail. Visit the websites of the retailers you frequent. NOTE: Anyplace you have an account. Log in and change the existing email address they have on file to this new email address you just created. Update your Anti-Virus, Anti-Spyware software. Run a full scan of your computer system and network. Download TrueCrypt and encrypt your files so only YOU can open them. NOTE: READ the directions with the program and TEST on a file first so you don’t lose anything critical. Back-up all of your documents and files (don’t forget iTunes and Pictures!). I’d suggest Carbonite, Mozy, or SugarSync for remote backup service. Proactively monitor your network – check computer processes, check firewall logs, educate employees – or use a service like Active Network Monitoring by The Lorenzi Group Finally, remember, this is not an all-inclusive list of things to do or order to do them in. This information is meant to be a helpful guide to get you started on the right track. The Lorenzi Group is not responsible for any losses or negative affects from you taking any, all, or none of these steps to protect your data (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
10. Resources Epsilon – www.epsilon.com Gmail – mail.google.com AVG – free.avg.com Avira– www.avira.com TruCrypt - www.truecrypt.org Carbonite - www.carbonite.com Mozy - www.mozy.com SugarSync - www.sugarsync.com FCC – www.fcc.org The Lorenzi Group 866-632-9880 x123 info@thelorenzigroup.com www.thelorenzigroup.com (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved