123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Recent Epsilon Data Breach Highlights The Need And Dependency For Information Security Training

Profile Picture
By Author: EC-COUNCIL
Total Articles: 68
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Epsilon, a leading marketing services firm, with a broad array of data- driven, multichannel marketing solutions whose customers also include Visa, Kraft, Citibank, Citibank, Walgreens, Disney, Barclay’s Bank, S Bancorp, Marriott. Ritz Carlton, LL Bean Marriott International, acknowledged a data breach incident in a brief statement recently. The data breach could make it the biggest of its kind in U.S. history "On March 30th, an incident was detected where a subset of Epsilon clients' customer data were exposed by an unauthorized entry into Epsilon's email system," Epsilon said. "The information that was obtained was limited to email addresses and/or customer names only."
The chairman of the Subcommittee on Privacy, Technology and the Law Sen. Al Franken told Politico that Americans should know more about who owns their information. Franken told Politico in a statement "Most of the people affected by the Epsilon breach had never heard of that company before this week. We need to give Americans more awareness about who has their information and greater ability to protect it."
Epsilon said it doesn't believe any ...
... other personal information was compromised, but it is now working with authorities on an investigation, a company spokeswoman said. And, now, Congress is demanding more information from Epsilon about exactly what information was stolen.
Epsilon is unclear how serious the issue is. In a letter to customers, Kroger said customer names and e-mail addresses were stolen. "As a result, it is possible you may receive some spam email messages," Kroger said. "We apologize for any inconvenience. Kroger wants to remind you not to open emails from senders you do not know. Also, Kroger would never ask you to email personal information such as credit card numbers or social security numbers. If you receive such a request, it did not come from Kroger and should be deleted," the letter states.
Epsilon sent 6.5 billion e-mail marketing messages in 2009, but the company also runs loyalty programs for Citi and Chase credit card users, and the kind of information stored in its databases could be extremely valuable to criminals looking to steal banking information in phishing attacks.
Epsilon told Chase that none of its customers' financial information was compromised, the bank said Friday in a press release.
A data breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so." Data breaches may involve financial information such as credit card or bank details, personal health information (PHI), personally identifiable information (PII), trade secrets of corporations or intellectual property. According to the nonprofit consumer organization Privacy Rights Clearinghouse, a total of 227,052,199 individual records containing sensitive personal information were involved in security breaches in the United States between January 2005 and May 2008, excluding incidents where sensitive data was apparently not actually exposed.
These report findings clearly points out that data breaches are very common these days. One way to mitigate internet security risks is with technical security training. EC-Council’s brand new TakeDownCon is a technical information security conference series, in addition to learning from some of the best security experts, TakeDownCon also offers highly sought after technical training courses, including the Certified Ethical Hacker (CEH) course, often touted as the world’s most comprehensive ethical hacking training program. The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

ABOUT EC-COUNCIL:
EC-Council is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous ethical hacking training, the Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other technical security training programs offered in over 60 countries around the globe. TakeDownCon Dallas 2011, is one of the conferences of EC-Council’s Take Down information security conference series.

Total Views: 289Word Count: 713See All articles From Author

Add Comment

Computers Articles

1. Do Refurbished Laptops Feel Like New?
Author: usedstore

2. Top Alumni Engagement Trends For Universities: What To Expect In 2025
Author: Brenda Joyce

3. Exporting Ui Assets With Sketch: Simplifying Your Workflow
Author: goodcoders

4. Dynamic Xpath In Selenium Webdriver A Complete Guide
Author: goodcoders

5. Tips For Selecting The Best Digital Marketing Company In Kolkata
Author: SEO Company Kolkata

6. Overcoming The Fragmentation Puzzle In Omnichannel Retail
Author: Sparity

7. Why Choose Startelelogic: A Leading Software Development Company In India
Author: Anna Mavis

8. Artificial Intelligence And Machine Learning: The Next Tech Plus
Author: Next Tech Plus

9. An Overview Of An Organic Seo Services Company
Author: Road To Top 5

10. The Power And Potential Of Data Mining
Author: Resear Infolabs

11. Cpd Accredited Typing Certificate Uk - Speed Test & Online Certification
Author: Kowser

12. Safe Connection With Mickey Mouse Cables- An Ultimate Guide
Author: Jennifer Truong

13. Develop A Widget For Ios App
Author: goodcoders

14. Develop An App From Scratch In 13 Steps
Author: goodcoders

15. The Best Antivirus Software For 2025
Author: Jasbeer SIngh

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: