ALL >> Computers >> View Article
Recent Epsilon Data Breach Highlights The Need And Dependency For Information Security Training

Epsilon, a leading marketing services firm, with a broad array of data- driven, multichannel marketing solutions whose customers also include Visa, Kraft, Citibank, Citibank, Walgreens, Disney, Barclay’s Bank, S Bancorp, Marriott. Ritz Carlton, LL Bean Marriott International, acknowledged a data breach incident in a brief statement recently. The data breach could make it the biggest of its kind in U.S. history "On March 30th, an incident was detected where a subset of Epsilon clients' customer data were exposed by an unauthorized entry into Epsilon's email system," Epsilon said. "The information that was obtained was limited to email addresses and/or customer names only."
The chairman of the Subcommittee on Privacy, Technology and the Law Sen. Al Franken told Politico that Americans should know more about who owns their information. Franken told Politico in a statement "Most of the people affected by the Epsilon breach had never heard of that company before this week. We need to give Americans more awareness about who has their information and greater ability to protect it."
Epsilon said it doesn't believe any ...
... other personal information was compromised, but it is now working with authorities on an investigation, a company spokeswoman said. And, now, Congress is demanding more information from Epsilon about exactly what information was stolen.
Epsilon is unclear how serious the issue is. In a letter to customers, Kroger said customer names and e-mail addresses were stolen. "As a result, it is possible you may receive some spam email messages," Kroger said. "We apologize for any inconvenience. Kroger wants to remind you not to open emails from senders you do not know. Also, Kroger would never ask you to email personal information such as credit card numbers or social security numbers. If you receive such a request, it did not come from Kroger and should be deleted," the letter states.
Epsilon sent 6.5 billion e-mail marketing messages in 2009, but the company also runs loyalty programs for Citi and Chase credit card users, and the kind of information stored in its databases could be extremely valuable to criminals looking to steal banking information in phishing attacks.
Epsilon told Chase that none of its customers' financial information was compromised, the bank said Friday in a press release.
A data breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so." Data breaches may involve financial information such as credit card or bank details, personal health information (PHI), personally identifiable information (PII), trade secrets of corporations or intellectual property. According to the nonprofit consumer organization Privacy Rights Clearinghouse, a total of 227,052,199 individual records containing sensitive personal information were involved in security breaches in the United States between January 2005 and May 2008, excluding incidents where sensitive data was apparently not actually exposed.
These report findings clearly points out that data breaches are very common these days. One way to mitigate internet security risks is with technical security training. EC-Council’s brand new TakeDownCon is a technical information security conference series, in addition to learning from some of the best security experts, TakeDownCon also offers highly sought after technical training courses, including the Certified Ethical Hacker (CEH) course, often touted as the world’s most comprehensive ethical hacking training program. The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
ABOUT EC-COUNCIL:
EC-Council is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous ethical hacking training, the Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other technical security training programs offered in over 60 countries around the globe. TakeDownCon Dallas 2011, is one of the conferences of EC-Council’s Take Down information security conference series.
Add Comment
Computers Articles
1. Rsgoldfast Runescape Gold:fishingAuthor: RuneScape gold
2. Understanding Mobile Intranet Workflow
Author: goodcoders
3. How To Personalize Your Mobile Ux?
Author: goodcoders
4. How To Optimize The Fintech Software Release Management Process
Author: goodcoders
5. Data Recovery Services Near Me: Your Ultimate Guide To Retrieving Lost Data
Author: adeel khan
6. Top 5 Data Cleansing Tools Of 2025
Author: Ben Gross
7. Come Ottenere Una Licenza Windows 11 In Italia: Guida Completa
Author: LicensePlanet
8. How To Build A Strong Brand Identity With Graphic Design
Author: dnd teams
9. Exploring The Generative Ai Market: Trends, Growth Drivers, And Future Outlook
Author: simran
10. Microsoft Dynamics 365 Vs Salesforce – Comparisons (2025)
Author: Maria
11. Top 5 Influencer Marketing Software Of 2025
Author: Ben Gross
12. Augmented Reality And Its Role In Manufacturing
Author: goodcoders
13. Effortless Environment Tracking With Tempgenius: Wifi Humidity Monitoring And Wireless Data Loggers
Author: Chris Miller
14. Sales Technology Trends That Will Impact Your Business In 2025
Author: Ben Gross
15. Infrastructure Management: Ensuring Efficiency And Sustainability
Author: ServerLT