How Would You Like To Have This Corporate Embarrassment On Your Record?

Back in April, the largest known e-mail security breach took place when Epsilon, an online marketing corporation, had their clients’ lists of e-mail addresses stolen by sophisticated cyber thieves. Epsilon was in charge of maintaining the e-mail databases and campaigns of some of the largest corporations in the country, including 1-800 Flowers, Best Buy, Walgreens, JPMorgan Chase, Capital One, and more. In fact, there’s a good chance that you’ve received multiple “apology” e-mails from these vendors. While some said the breach didn’t cause a whole lot of damage, we disagree. Essentially, these cyber criminals now have the ability to invent highly sophisticated phishing attacks by creating e-mail offers that look like legitimate promotions coming from companies they (the people whose e-mail addresses were stolen) buy from and trust. And though it’s already common for cyber thieves to impersonate credible organizations with what appears to be legitimate e-mail messages that seek to verify account information, this recent breach of security allows cyber thieves to be smarter and even more targeted with their scams. Two Key Lessons First, you need to be a lot more wary of e-mail promotions and communications that ask you to provide your credit card information or to validate your account information (username, password, social security number, etc.). No valid company will ever ask you to send important, confidential information in that manner. Second, this breach serves as a warning to all businesses that they must have the MOST up-to-date security systems in place for their computer network, especially if you handle client data such as credit cards, bank accounts, social security numbers, passwords, client lists and more. Epsilon has responded to the security breach, apologizing to all of those affected, but the damage is done to their organization, not to mention their clients. That’s why we urge all of our clients to enroll in our . This service allows us to monitor your network’s anti-virus, firewall and security settings to make sure your network is fully protected against these damaging events.

Epsilon Sets the Bar for What NOT to Do in Online Security

Many IT service providers are learning valuable lessons from the Epsilon incident – which saw one of the world’s biggest email service providers become a victim of cyber-criminals, compromising a substantial amount of information entrusted to them by their clients. There’s been a lot of buzz recently about Epsilon, one of the biggest email service providers in the world, as it suffers from the backlash of allowing itself to be a victim of phishing efforts – which has affected the business data of as many as 50 major companies who are clients of theirs. Reports are also citing Epsilon’s failure to heed an alert from a business partner which advised the provider to be on its toes against potential attacks from cyber-criminals targeted towards email service providers. The damage estimates vary, with Epsilon citing only about 2% of their data being stolen, but the impact is undeniable. Cyber-criminals now have access to a sizable number of personal data stored through Epsilon – passwords, account numbers, and even the purchasing / buying habits of the customers of Epsilonงs clients. Many of Epsilon’s clients are now sending out messages to their own customers, warning them that their email addresses may have been compromised. It’s a lesson to companies, big and small, to pay more attention to beefing up their security protocols, since all it takes is one breach to endanger all of your data. In addition to having the right security software, it also helps if you require your employees undergo proper user training to make sure that they won’t be easily baited by scams like phishing, and will be more aware of how to contribute to the safety of your business data. Failing to do so puts not only your company, but also your clients, at risk. If you’d like to make sure your systems are safe, call us and we’ll evaluate your current security measures and suggest ways to make critical improvements.