SlideShare a Scribd company logo
OOPs…Epsilon had a Data Breach…. What does this mean to YOU? (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
FACTS Epsilon is a large email marketing company. When you receive emails from banks, recruiting companies, stores, and other organizations, there is a HIGH likelihood it is originating at Epsilon. Epsilon has reported that EMAIL addresses were stolen Epsilon is not able to confirm if EMAIL was all that was taken (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Who CARES?? You should.  And here is why: It’s GREAT (for Epsilon) if ONLY email addresses were stolen, however those email accounts were stored in a database that tracked who Epsilon’s clients were, so the hackers likely also have the companies you have relationships with (Chase, JP Morgan, Best Buy, Walgreens, Robert Half Recruiters, Target, Disney, and MANY others…..) NOTE:  We ALL need to be aware of how companies handle private information, otherwise it can be used against us! (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
So what…. The hackers want the rest of your information (IF they don’t have it already)  ……..and will be  attacking you for it. 3 Types of emails you may see:  Vendor Email Competitor Email Third-Party Email (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Email 1: From the Vendor An email from the hackers, disguised as an email from the vendor apologizing and asking you to:  Create a new account  Change your password  Confirm your email address  Sign up for free protection service Something else In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Email 2: From a Competitor An email form the hackers, disguised as an email from the vendor’s competitor. (example ONLY: from Wal-Mart b/c they do not appear to have been affected by this breach)  This email will discuss the recent breach and how their organization takes “extra” precautions and that they know consumers are concerned. They will be offering something (maybe a 20% discount) for first time buyers to try them out.   In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Email 3: From a Third Party  These emails will be from the hackers, disguised as one from:  Government  Trade Association  ISP  Web Domain Hosting Company  Law Firm leading a class action lawsuit against Epsilon et al.  It will say something like: “We are contacting you to verify/assure you/ask you to participate.  If your name is on the list attached, there are funds available to protect your data.  This is free money you can use to pay bills, change your email address, or buy updated antivirus software….” (whatever it is, it will be some offer or call to action)  In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
The BEST viruses and worms Exist on the computer without you even knowing.  The second you click the link or open the attachment, expect your data to be shared. Which data? Passwords User Names Credit Card and Banking Information Documents Pictures & Videos Anything else the hackers want (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
How to Protect Yourself & Your Data Set up an brand new email address at Gmail.   Visit the websites of the retailers you  frequent. NOTE: Anyplace you have an account. Log in and change the existing email address they have on file to this new email address you just created.  Update your Anti-Virus, Anti-Spyware software.  Run a full scan of your computer system and network. Download TrueCrypt and encrypt your files so only YOU can open them.  NOTE:  READ the directions with the program and TEST on a file first so you don’t lose anything critical. Back-up all of your documents and files (don’t forget iTunes and Pictures!).  I’d suggest Carbonite, Mozy, or SugarSync for remote backup service.  Proactively monitor your network – check computer processes, check firewall logs, educate employees – or use a service like Active Network Monitoring by The Lorenzi Group Finally, remember, this is not an all-inclusive list of things to do or order to do them in.  This information is meant to be a helpful guide to get you started on the right track.  The Lorenzi Group is not responsible for any losses or negative affects from you taking any, all, or none of these steps to protect your data (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Resources Epsilon – www.epsilon.com Gmail – mail.google.com AVG – free.avg.com Avira– www.avira.com TruCrypt - www.truecrypt.org Carbonite - www.carbonite.com Mozy - www.mozy.com SugarSync - www.sugarsync.com FCC – www.fcc.org The Lorenzi Group 866-632-9880 x123  info@thelorenzigroup.com www.thelorenzigroup.com (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved

More Related Content

Similar to Introduction to the Epsilon Data Breach

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
JOHN BABATUNDE LEE
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
QuiMo3
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Networkthowell
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
Gary Wagnon
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
Brian Pichman
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
Brian Pichman
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
DeepakYadav1095
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?
Tayfun TEK
 
Artifacts... that's the name of the game! avengercon - nov 2018
Artifacts... that's the name of the game!   avengercon - nov 2018Artifacts... that's the name of the game!   avengercon - nov 2018
Artifacts... that's the name of the game! avengercon - nov 2018
Fernando Tomlinson, CISSP, MBA
 
Intellix Systems
Intellix SystemsIntellix Systems
Intellix SystemsTea C.
 
SpyFly Background Checks Services Help Center
SpyFly Background Checks Services Help CenterSpyFly Background Checks Services Help Center
SpyFly Background Checks Services Help Center
Spyfly
 
Email Marketing The Easy Way
Email Marketing The Easy WayEmail Marketing The Easy Way
Email Marketing The Easy Way
MichaelFernandez110
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthem
amason04
 
Safe Computing
Safe ComputingSafe Computing
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the Law
Ramon Ray
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
Billy Warero
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?
Cristina Collado
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
lesteraporado16
 
Email Inbox Troubleshooting Guide
Email Inbox Troubleshooting GuideEmail Inbox Troubleshooting Guide
Email Inbox Troubleshooting Guide
Email Delivered
 

Similar to Introduction to the Epsilon Data Breach (20)

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?
 
Artifacts... that's the name of the game! avengercon - nov 2018
Artifacts... that's the name of the game!   avengercon - nov 2018Artifacts... that's the name of the game!   avengercon - nov 2018
Artifacts... that's the name of the game! avengercon - nov 2018
 
Intellix Systems
Intellix SystemsIntellix Systems
Intellix Systems
 
SpyFly Background Checks Services Help Center
SpyFly Background Checks Services Help CenterSpyFly Background Checks Services Help Center
SpyFly Background Checks Services Help Center
 
Email Marketing The Easy Way
Email Marketing The Easy WayEmail Marketing The Easy Way
Email Marketing The Easy Way
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthem
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the Law
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Email marketing masterclass june 2013
Email marketing masterclass june 2013Email marketing masterclass june 2013
Email marketing masterclass june 2013
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Email Inbox Troubleshooting Guide
Email Inbox Troubleshooting GuideEmail Inbox Troubleshooting Guide
Email Inbox Troubleshooting Guide
 

More from The Lorenzi Group

Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out
The Lorenzi Group
 
ROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat HelperROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat HelperThe Lorenzi Group
 
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...The Lorenzi Group
 
ROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsThe Lorenzi Group
 
ROARing Compliance
ROARing ComplianceROARing Compliance
ROARing Compliance
The Lorenzi Group
 
ROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture PerfectROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture PerfectThe Lorenzi Group
 
ROAR in Pictures: Biking
ROAR in Pictures: BikingROAR in Pictures: Biking
ROAR in Pictures: Biking
The Lorenzi Group
 
DDoS Explained
DDoS ExplainedDDoS Explained
DDoS Explained
The Lorenzi Group
 
Digital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' DilemmaDigital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' Dilemma
The Lorenzi Group
 
Rising Cost of Child Porn Defense
Rising Cost of Child Porn DefenseRising Cost of Child Porn Defense
Rising Cost of Child Porn Defense
The Lorenzi Group
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
The Lorenzi Group
 
So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....
The Lorenzi Group
 
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next FrontierDigital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
The Lorenzi Group
 
Digital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial ExecutiveDigital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial Executive
The Lorenzi Group
 
Digital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesDigital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR Executives
The Lorenzi Group
 
eDiscovery IS Data Security
eDiscovery IS Data SecurityeDiscovery IS Data Security
eDiscovery IS Data Security
The Lorenzi Group
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
The Lorenzi Group
 
Sex, Crime, & Online Slime
Sex, Crime, & Online SlimeSex, Crime, & Online Slime
Sex, Crime, & Online Slime
The Lorenzi Group
 

More from The Lorenzi Group (20)

Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out
 
ROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat HelperROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat Helper
 
ROAR for IT Managers
ROAR for IT ManagersROAR for IT Managers
ROAR for IT Managers
 
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
 
The Many Faces of SHIELD
The Many Faces of SHIELDThe Many Faces of SHIELD
The Many Faces of SHIELD
 
ROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital Enviroments
 
ROARing Compliance
ROARing ComplianceROARing Compliance
ROARing Compliance
 
ROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture PerfectROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture Perfect
 
ROAR in Pictures: Biking
ROAR in Pictures: BikingROAR in Pictures: Biking
ROAR in Pictures: Biking
 
DDoS Explained
DDoS ExplainedDDoS Explained
DDoS Explained
 
Digital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' DilemmaDigital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' Dilemma
 
Rising Cost of Child Porn Defense
Rising Cost of Child Porn DefenseRising Cost of Child Porn Defense
Rising Cost of Child Porn Defense
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
 
So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....
 
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next FrontierDigital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
 
Digital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial ExecutiveDigital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial Executive
 
Digital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesDigital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR Executives
 
eDiscovery IS Data Security
eDiscovery IS Data SecurityeDiscovery IS Data Security
eDiscovery IS Data Security
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
 
Sex, Crime, & Online Slime
Sex, Crime, & Online SlimeSex, Crime, & Online Slime
Sex, Crime, & Online Slime
 

Recently uploaded

Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
AUDIJEAngelo
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 

Recently uploaded (20)

Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 

Introduction to the Epsilon Data Breach

  • 1. OOPs…Epsilon had a Data Breach…. What does this mean to YOU? (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 2. FACTS Epsilon is a large email marketing company. When you receive emails from banks, recruiting companies, stores, and other organizations, there is a HIGH likelihood it is originating at Epsilon. Epsilon has reported that EMAIL addresses were stolen Epsilon is not able to confirm if EMAIL was all that was taken (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 3. Who CARES?? You should. And here is why: It’s GREAT (for Epsilon) if ONLY email addresses were stolen, however those email accounts were stored in a database that tracked who Epsilon’s clients were, so the hackers likely also have the companies you have relationships with (Chase, JP Morgan, Best Buy, Walgreens, Robert Half Recruiters, Target, Disney, and MANY others…..) NOTE: We ALL need to be aware of how companies handle private information, otherwise it can be used against us! (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 4. So what…. The hackers want the rest of your information (IF they don’t have it already) ……..and will be attacking you for it. 3 Types of emails you may see: Vendor Email Competitor Email Third-Party Email (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 5. Email 1: From the Vendor An email from the hackers, disguised as an email from the vendor apologizing and asking you to: Create a new account Change your password Confirm your email address Sign up for free protection service Something else In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 6. Email 2: From a Competitor An email form the hackers, disguised as an email from the vendor’s competitor. (example ONLY: from Wal-Mart b/c they do not appear to have been affected by this breach) This email will discuss the recent breach and how their organization takes “extra” precautions and that they know consumers are concerned. They will be offering something (maybe a 20% discount) for first time buyers to try them out. In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 7. Email 3: From a Third Party These emails will be from the hackers, disguised as one from: Government Trade Association ISP Web Domain Hosting Company Law Firm leading a class action lawsuit against Epsilon et al. It will say something like: “We are contacting you to verify/assure you/ask you to participate. If your name is on the list attached, there are funds available to protect your data. This is free money you can use to pay bills, change your email address, or buy updated antivirus software….” (whatever it is, it will be some offer or call to action) In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 8. The BEST viruses and worms Exist on the computer without you even knowing. The second you click the link or open the attachment, expect your data to be shared. Which data? Passwords User Names Credit Card and Banking Information Documents Pictures & Videos Anything else the hackers want (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 9. How to Protect Yourself & Your Data Set up an brand new email address at Gmail. Visit the websites of the retailers you frequent. NOTE: Anyplace you have an account. Log in and change the existing email address they have on file to this new email address you just created. Update your Anti-Virus, Anti-Spyware software. Run a full scan of your computer system and network. Download TrueCrypt and encrypt your files so only YOU can open them. NOTE: READ the directions with the program and TEST on a file first so you don’t lose anything critical. Back-up all of your documents and files (don’t forget iTunes and Pictures!). I’d suggest Carbonite, Mozy, or SugarSync for remote backup service. Proactively monitor your network – check computer processes, check firewall logs, educate employees – or use a service like Active Network Monitoring by The Lorenzi Group Finally, remember, this is not an all-inclusive list of things to do or order to do them in. This information is meant to be a helpful guide to get you started on the right track. The Lorenzi Group is not responsible for any losses or negative affects from you taking any, all, or none of these steps to protect your data (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 10. Resources Epsilon – www.epsilon.com Gmail – mail.google.com AVG – free.avg.com Avira– www.avira.com TruCrypt - www.truecrypt.org Carbonite - www.carbonite.com Mozy - www.mozy.com SugarSync - www.sugarsync.com FCC – www.fcc.org The Lorenzi Group 866-632-9880 x123 info@thelorenzigroup.com www.thelorenzigroup.com (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved