{"id":92291,"date":"2024-10-21T11:49:59","date_gmt":"2024-10-21T03:49:59","guid":{"rendered":"https:\/\/version-2.com\/?p=92291"},"modified":"2024-10-10T11:51:18","modified_gmt":"2024-10-10T03:51:18","slug":"epsilon-the-most-expensive-data-breach-youve-never-heard-of","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/10\/epsilon-the-most-expensive-data-breach-youve-never-heard-of\/","title":{"rendered":"Epsilon: The Most Expensive Data Breach You\u2019ve Never Heard Of"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"92291\" class=\"elementor elementor-92291\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/10\/Epsilon.png.webp\" width=\"1200\" height=\"798\" \/><\/p><div class=\"fl-module-content fl-node-content\"><h2>Epsilon: The Most Expensive Data Breach You\u2019ve Never Heard Of<\/h2><p>Search for the most expensive data breaches in history, and you\u2019ll see a<a href=\"https:\/\/em360tech.com\/top-10\/expensive-cyber-attacks\"> list of names<\/a> you\u2019re undoubtedly familiar with: Yahoo ($470 million), Target ($300 million), TJX ($256 million), Sony Playstation Network ($171 million.) But at the top of the list \u2013 often in the number one spot \u2013 is a firm called Epsilon, which suffered a data breach in 2011 that cost an eye-watering <strong>4 BILLION<\/strong> dollars. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p>Who or what is Epsilon?<span class=\"Apple-converted-space\">\u00a0 <\/span>Why was their data breach so expensive?<span class=\"Apple-converted-space\">\u00a0 <\/span>And have we learned lessons from it so that we can prevent it in the future?<span class=\"Apple-converted-space\">\u00a0 <\/span>(Spoiler alert: No.) Let\u2019s delve into the story:<\/p><p>\u00a0<\/p><p><b>First, what makes a data breach expensive?<\/b><\/p><p>Data breach costs <a href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/rising-costs-of-data-breaches\/\">continue to rise<\/a>. The average cost of a data breach in 2024 is $4.88 million, which is by no means a small chunk of change. That number begs the question, however; why are some breaches so much more expensive?<\/p><p>According to IBM, there are four <a href=\"https:\/\/www.armis.com\/faq\/what-is-the-average-cost-of-a-data-breach\/\">key areas <\/a>that contribute to the expense of a data breach:<\/p><p><b>Detection and Escalation<\/b><\/p><p>Detection is the process of finding the breach and determining its full extent.<span class=\"Apple-converted-space\">\u00a0 <\/span>It involves tools like SIEM (Security Information &amp; Event Management) and IDR (Intrusion Detection and Response.) Some things to watch out for are odd traffic patterns (like a security camera suddenly passing several gigabytes of data), repeated access requests from an unidentified source, and abnormal data transfers.<span class=\"Apple-converted-space\">\u00a0 <\/span><\/p><p>Escalation is the process of letting the correct people in the organization know.<span class=\"Apple-converted-space\">\u00a0 <\/span>It probably starts with IT and security staff and then branches into legal, product, engineering, senior leaders, etc. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p>These may not seem like big hurdles, but consider this: it can take months to discover the true extent of a data breach through thorough investigation.<span class=\"Apple-converted-space\">\u00a0 <\/span>You have no way of knowing which systems are compromised and which channels are safe, and you risk giving the hackers time to hide more effectively if they are privy to your communications.<span class=\"Apple-converted-space\">\u00a0 <\/span>You might find yourself having to suddenly invest in tools like encrypted messaging, password managers, or hardware security tokens like PIV (personal identity verification) cards. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p><b>Notification<\/b><\/p><p>Notification is how you alert the outside world of the data breach.<span class=\"Apple-converted-space\">\u00a0 <\/span>From customers to regulators, the sooner you make a statement and share the facts the better.<span class=\"Apple-converted-space\">\u00a0 <\/span>Being transparent about what data was compromised, providing regular updates on the investigation, and outlining how you will prevent future breaches are all essential elements of your notification strategy.<\/p><p><b>Post-Breach Response<\/b><\/p><p>How are you going to make people feel like they can safely do business with you?<span class=\"Apple-converted-space\">\u00a0 <\/span>That\u2019s the question your post-breach response has to answer.<span class=\"Apple-converted-space\">\u00a0 <\/span>Offering things like free credit monitoring, compensation for any fees or financial costs they incur, and clear communication about the steps you\u2019re taking to strengthen your security measures can help rebuild trust.<\/p><p><b>Lost Business<\/b><\/p><p>It cannot be overstated how disruptive a data breach is to a company\u2019s operations.<span class=\"Apple-converted-space\">\u00a0 <\/span>Everything \u2013 development, sales, support, marketing \u2013 grinds to a halt while the breach is investigated.<span class=\"Apple-converted-space\">\u00a0 <\/span>Your customer-facing departments like support and sales will be inundated with questions and complaints.<span class=\"Apple-converted-space\">\u00a0 <\/span>Forget about future plans and roadmaps \u2013 everything is consumed by the data breach.<span class=\"Apple-converted-space\">\u00a0 <\/span>Customers will churn.<span class=\"Apple-converted-space\">\u00a0 <\/span>Prospects will disappear or expect incredibly deep discounts.<span class=\"Apple-converted-space\">\u00a0 \u00a0<\/span><\/p><p>With all of these to consider, costs add up rapidly.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p><b>Who is Epsilon?<\/b><\/p><p>Founded in 1969, Epsilon was one of the world\u2019s largest marketing firms until it was acquired by Publicis Groupe in 2019. Epsilon is an industry leader in data-driven marketing, consistently ranking among the top firms in the industry.<span class=\"Apple-converted-space\">\u00a0 <\/span>They boasted clients across several industries:<\/p><p>Financial Institutions: American Express, Citibank, Capital One, Barclays<\/p><p>Retailers: Target, L.L. Bean, Best Buy<\/p><p>Hospitality: Hilton, Mariott<\/p><p>Other large clients: Disney, TiVo, Kroger, Verizon<\/p><p>One of their core services was managing e-mail marketing campaigns, so they had a massive database of e-mail addresses across all of their clients.<\/p><p><b>What happened?<\/b><\/p><p>In April 2011, Epsilon announced that it had been the victim of a data breach. Although it hasn\u2019t released full details of how exactly it happened, the general consensus is that it was a phishing attack. This makes sense, considering these types of attacks are still extremely common. The hackers were able to access Epsilon\u2019s e-mail database and obtained <a href=\"https:\/\/www.alpinesecurity.com\/blog\/top-5-cybersecurity-breaches-of-all-time\/\">250 million records<\/a> from 75 of Epsilon\u2019s clients. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p>Although Epsilon quickly alerted its own clients, it left communicating with the actual victims up to them.<span class=\"Apple-converted-space\">\u00a0 <\/span>This resulted in somewhat inconsistent notifications; Verizon, for instance, <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/insider-threat-management\/throwback-hack-epsilon-email-breach-2011\">took a week to notify<\/a> their customers, saying they \u201cWanted to make sure [we] had the most detailed information possible from Epsilon.\u201d<\/p><p>No personal information was compromised, just names and e-mail addresses.<span class=\"Apple-converted-space\">\u00a0 <\/span>However, this opened the victims up to more targeted e-mail scams; for instance, if you see that a particular e-mail address is associated with Barclay Bank, you can send a series of <a href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/preventing-cyberattack\/\">spear phishing <\/a>attacks to that specific person that appear more legitimate.<span class=\"Apple-converted-space\">\u00a0 <\/span>To wit, the perpetrators raked in an<a href=\"https:\/\/www.alpinesecurity.com\/blog\/top-5-cybersecurity-breaches-of-all-time\/\"> estimated $2 million from spam e-mails<\/a>.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p><b>The Aftermath<\/b><\/p><p>3 people were <a href=\"https:\/\/ago.vermont.gov\/sites\/ago\/files\/wp-content\/uploads\/2018\/02\/2015-03-06-Krebs-Feds-Indict-Three-in-2011-Epsilon-Hack.pdf\">indicted<\/a>;<span class=\"Apple-converted-space\">\u00a0 <\/span>two were sentenced and one remains at large and wanted.<span class=\"Apple-converted-space\">\u00a0 <\/span>Epsilon lost an estimated $45 million in business as clients left in droves; paid out <a href=\"https:\/\/www.justice.gov\/opa\/pr\/marketing-company-agrees-pay-150-million-facilitating-elder-fraud-schemes\">another $127.5 million<\/a> to victims in a settlement with the Department of Justice, and another <a href=\"https:\/\/www.alpinesecurity.com\/blog\/top-5-cybersecurity-breaches-of-all-time\/\">$225 million<\/a> in forensic audits, monitoring, litigation, and more. Total cost of the damage:<span class=\"Apple-converted-space\">\u00a0 <\/span>$4 billion. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p>We\u2019d love to tell you that lessons were learned, security was tightened, and this kind of attack never happened again\u2026..we sure would love to tell you that.<span class=\"Apple-converted-space\">\u00a0 <\/span>To be fair, this hack did lead to greater awareness of vulnerabilities in databases and an improvement in best practices around security in general.<span class=\"Apple-converted-space\">\u00a0 <\/span>But overall, the initial method of entry \u2013 compromised credentials via a phishing attack \u2013 is still one of the most common techniques hackers use today.<span class=\"Apple-converted-space\">\u00a0 <\/span>In fact, <a href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/the-silent-epidemic-compromised-credentials\/\">compromised credentials<\/a> account for 80% of all data breaches.<span class=\"Apple-converted-space\">\u00a0 <\/span>The smartest thing an organization can do is shift to <a href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/battling-password-hacking-with-passwordless-authentication\/\">passwordless authentication<\/a> \u2013 unless they just happen to have $4 billion lying around. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Epsilon: The Most Expensive Data Breach You\u2019ve Never He [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,1273,61],"tags":[352,423,1272],"class_list":["post-92291","post","type-post","status-publish","format-standard","hentry","category-portnox","category-1273","category-press-release","tag-network","tag-portnox","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Epsilon: The Most Expensive Data Breach You\u2019ve Never Heard Of - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/epsilon-most-expensive-breach-youve-never-heard-of\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Epsilon: The Most Expensive Data Breach You\u2019ve Never Heard Of - Version 2\" \/>\n<meta property=\"og:description\" content=\"Epsilon: The Most Expensive Data Breach You\u2019ve Never He [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/epsilon-most-expensive-breach-youve-never-heard-of\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-21T03:49:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/10\/Epsilon.png.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/epsilon-most-expensive-breach-youve-never-heard-of\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/epsilon-the-most-expensive-data-breach-youve-never-heard-of\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Epsilon: The Most Expensive Data Breach You\u2019ve Never Heard Of\",\"datePublished\":\"2024-10-21T03:49:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/epsilon-the-most-expensive-data-breach-youve-never-heard-of\\\/\"},\"wordCount\":1007,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/epsilon-most-expensive-breach-youve-never-heard-of\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/10\\\/Epsilon.png.webp\",\"keywords\":[\"Network\",\"Portnox\",\"2024\"],\"articleSection\":[\"Portnox\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/epsilon-the-most-expensive-data-breach-youve-never-heard-of\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/epsilon-most-expensive-breach-youve-never-heard-of\\\/\",\"name\":\"Epsilon: The Most Expensive Data Breach You\u2019ve Never Heard Of - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/epsilon-most-expensive-breach-youve-never-heard-of\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/epsilon-most-expensive-breach-youve-never-heard-of\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/10\\\/Epsilon.png.webp\",\"datePublished\":\"2024-10-21T03:49:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/epsilon-most-expensive-breach-youve-never-heard-of\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/epsilon-most-expensive-breach-youve-never-heard-of\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/epsilon-most-expensive-breach-youve-never-heard-of\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/10\\\/Epsilon.png.webp\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/10\\\/Epsilon.png.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/epsilon-most-expensive-breach-youve-never-heard-of\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Epsilon: The Most Expensive Data Breach You\u2019ve Never Heard Of\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Epsilon: The Most Expensive Data Breach You\u2019ve Never Heard Of - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/epsilon-most-expensive-breach-youve-never-heard-of\/","og_locale":"en_US","og_type":"article","og_title":"Epsilon: The Most Expensive Data Breach You\u2019ve Never Heard Of - Version 2","og_description":"Epsilon: The Most Expensive Data Breach You\u2019ve Never He [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/epsilon-most-expensive-breach-youve-never-heard-of\/","og_site_name":"Version 2","article_published_time":"2024-10-21T03:49:59+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/10\/Epsilon.png.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/epsilon-most-expensive-breach-youve-never-heard-of\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/10\/epsilon-the-most-expensive-data-breach-youve-never-heard-of\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Epsilon: The Most Expensive Data Breach You\u2019ve Never Heard Of","datePublished":"2024-10-21T03:49:59+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/10\/epsilon-the-most-expensive-data-breach-youve-never-heard-of\/"},"wordCount":1007,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/epsilon-most-expensive-breach-youve-never-heard-of\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/10\/Epsilon.png.webp","keywords":["Network","Portnox","2024"],"articleSection":["Portnox","2024","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/10\/epsilon-the-most-expensive-data-breach-youve-never-heard-of\/","url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/epsilon-most-expensive-breach-youve-never-heard-of\/","name":"Epsilon: The Most Expensive Data Breach You\u2019ve Never Heard Of - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/epsilon-most-expensive-breach-youve-never-heard-of\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/epsilon-most-expensive-breach-youve-never-heard-of\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/10\/Epsilon.png.webp","datePublished":"2024-10-21T03:49:59+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/epsilon-most-expensive-breach-youve-never-heard-of\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/cyber-attacks\/epsilon-most-expensive-breach-youve-never-heard-of\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/epsilon-most-expensive-breach-youve-never-heard-of\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/10\/Epsilon.png.webp","contentUrl":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/10\/Epsilon.png.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/epsilon-most-expensive-breach-youve-never-heard-of\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Epsilon: The Most Expensive Data Breach You\u2019ve Never Heard Of"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-o0z","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/92291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=92291"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/92291\/revisions"}],"predecessor-version":[{"id":92295,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/92291\/revisions\/92295"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=92291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=92291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=92291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}