DETECT MONITORING SERVICES MITIGATING THE EPSILON EMAIL BREACH SUMMARY



Similar documents
How To Protect Your Online Banking From Fraud

BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS

Fraud Threat Intelligence

10 Things Every Web Application Firewall Should Provide Share this ebook

ACI Response to FFIEC Guidance

The Impact of Extended Validation (EV) Certificates on Customer Confidence

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT

Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

White Paper. Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

WHITE PAPER Moving Beyond the FFIEC Guidelines

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

OIG Fraud Alert Phishing

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

How To Buy Nitro Security

IBM QRadar Security Intelligence April 2013

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

The Cyber Threat Profiler

September 20, 2013 Senior IT Examiner Gene Lilienthal

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

INSIDE. Mitigating Online Fraud: Customer Confidence, Brand Protection, and Loss Minimization. Symantec Online Fraud Management

Protecting Against Online Fraud with F5

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks

Evaluating DMARC Effectiveness for the Financial Services Industry

ALERT LOGIC FOR HIPAA COMPLIANCE

Marble & MobileIron Mobile App Risk Mitigation

Fraud and Abuse Policy

Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk

Web Presence Security

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

2012 Endpoint Security Best Practices Survey

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Attack Intelligence: Why It Matters

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Internet Reputation Management Guidelines Building a Roadmap for Continued Success

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

NATIONAL CYBER SECURITY AWARENESS MONTH

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

IBM Advanced Threat Protection Solution

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy.

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Host-based Protection for ATM's

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Strengthen security with intelligent identity and access management

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Selecting the right cybercrime-prevention solution

GUIDE. Stop Phishing: A Guide to Protecting Your Web Site Against Phishing Scams

Peter Hill, Oracle Reveleus & Mantas

Teradata and Protegrity High-Value Protection for High-Value Data

IBM Security X-Force Threat Intelligence

Software that provides secure access to technology, everywhere.

Under the Hood of the IBM Threat Protection System

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Information Security Incident Management Guidelines

Payment Card Industry Data Security Standard

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Remote Deposit Quick Start Guide

Supplement to Authentication in an Internet Banking Environment

Cisco Security IntelliShield Alert Manager Service

FFIEC CONSUMER GUIDANCE

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

How To Create An Insight Analysis For Cyber Security

Who s Doing the Hacking?

Breaking down silos of protection: An integrated approach to managing application security

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Event Logs are Key to a Secure Network

Transcription:

DETECT MONITORING SERVICES MITIGATING THE EPSILON EMAIL BREACH SUMMARY The April 1st statement released by the marketing firm Epsilon has turned out to be no April Fools Day joke. Sophisticated and targeted phishing attacks are sure to follow. In order to neutralize these attacks, businesses must not rely solely on lookout alert emails, but must instead proactively identify and shutdown attacks before they can reach their customers. Detect Monitoring Services by Easy Solutions is the tool that allows for this proactive protection.

THE EPSILON BREACH 1 The April 1st statement released by the marketing firm Epsilon has turned out to be no April Fools Day joke. The statement, posted below, is sure to result in stiff economic losses, countless investigation hours, and damaged brand reputations for affected businesses. On March 30th, an incident was detected where a subset of Epsilon clients' customer data were exposed by an unauthorized entry into Epsilon's email system. The information that was obtained was limited to email addresses and/or customer names only. A rigorous assessment determined that no other personal identifiable information associated with those names was at risk. A full investigation is currently underway. SOURCE: www.epsilon.com (accessed April 1, 2011) -Epsilon Statement, April 1st, 2011 As associated banks, retailers, and other enterprises now scramble to alert their customers to remain ultra-vigilant for future scams, the responsible businesses will implement more robust mitigation plans that go beyond traditional lookout alerts. One glaring issue with email alerts is that the customers themselves must decipher which are authentic and which are fake. Businesses may encourage their customers to call in to confirm electronic messages, but this approach can drain resources as well as be manipulated by the attackers. Cybercriminals are more adept than ever at imitating legitimate businesses and misleading customers to reveal sensitive information that can lead to account takeovers. Millions of dollars are lost annually, and the Anti-Phishing Working Group, an organization devoted to stopping Internet crime, has reported over 33,000 phishing attacks worldwide in the month of June, the most recent month for which data is available. Instead of relying solely on their customers to deal with sophisticated and targeted online attacks, businesses must proactively identify and shutdown scams before they can reach their customers. Easy Solutions, the only information security vendor that focuses exclusively on online fraud protection, has developed Detect Monitoring Services (DMS) to proactively identify and deactivate online phishing scams. The tool has successfully disabled thousands of online phishing attacks and is available for organizations that use the Internet channel to drive business. 2

DETECT MONITORING SERVICES 2 DMS is currently used by dozens of financial institutions and businesses and works by monitoring visitors who connect to protected websites. DMS technology collects high level yet relevant connection information in real-time that include the associated geolocation of the IP address, Internet service provider, visitation history of the user, time of day, type of operating system used, and additional relevant data. This captured information then feeds into a correlation engine that identifies a malicious user. When a malicious connection is detected, the 24/7/365 Easy Solutions security analyst team is immediately alerted and tracks the user s online activity. The security team then observes and investigates the actions of the user. For example, the team discerns if the user is simply exploring, copying, or injecting harmful code that exploits a vulnerability within the website. If there is any unauthorized malicious activity by the user, the security analyst notifies the affected business AND then quickly deactivates any fraudulent phishing websites and attacks that were created. All online assets of the business are proactively monitored and protected. Easy Solutions DMS is remarkable because it significantly reduces the time an online attack can affect customers from 58.1 hours to 3.6 hours on average. This greater than 16 fold reduction is critical because this window of time is when customers are exponentially exposed to attacks. Businesses can also report attacks that the DMS team will then investigate and deactivate. 3

PROACTIVE PROTECTION 3 Businesses must learn from the Epsilon breach and proactively work to detect and shutdown sophisticated, organized, and targeted attacks that affect their customers. DMS by Easy Solutions is the tool that allows for this proactive shutdown and is available to start protecting your business today. START PROTECTING YOUR ONLINE BUSINESS CHANNELS AND CUSTOMERS WITH DETECT MONITORING SERVICES BY EASY SOLUTIONS For additional information including DMS demonstrations, please contact David Sylvester or visit the Easy Solutions website. David Sylvester dsylvester@easysol.net, Business Development Manager Tels: (206) 452-5613, (866) 524-4782 ext. 103 4

ABOUT EASY SOLUTIONS 4 Easy Solutions is the only security vendor focused exclusively on fraud prevention, providing anti-phishing services, multifactor authentication and anomaly transaction detection. Easy Solutions delivers an integrated and comprehensive approach to multichannel fraud prevention and works in alliance with industry leaders in other security disciplines supporting a wide range of heterogeneous platforms. Headquarters: 1401 Sawgrass Corporate Parkway, Sunrise, FL 33323 Tel. +1-866-5244782 Latin America: Cra. 13A No. 98 21 Of. 401 Bogota, Colombia Tel. +57 1-7425570. Copyright 2011 Easy Solutions, Inc. All rights reserved worldwide. Easy Solutions, the Easy Solutions logo, Detect ID, Detect TA, Detect CA, Detect ID Web Authenticator, Total Fraud Protection, Detect Safe Browsing, Detect ATM, Detect Monitoring Services, Detect Vulnerability Scanning Service, Detect Social Engineering Assessment, Protect Your Business and Detect Professional Services are either registered trademarks or trademarks of Easy Solutions, Inc. All other trademarks are property of their respective owner. Specifications and content in this document are subject to change without notice. 5