Preview

Hannaford Bros. Cyber Security Lessons Learned

Powerful Essays
Open Document
Open Document
1647 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hannaford Bros. Cyber Security Lessons Learned
Introduction
Virtually every business today uses at least one form of computer information technology. Business firms use computers to automate and assist in managing everything from operations, sales, finance, and logistics. Internal databases and intranets are used for internal controls and organizations are connected via the internet to conduct sales, marketing and many other communications and transactions. Electronic business, or e-business, is dominating modern markets and the business world. This new world of technological innovation has exponentially increased efficiency and globalized the world’s economies. Unfortunately criminals still exist and continue to exploit businesses, committing acts of theft, vandalism, and terror. E-business is not immune to criminal mischief and in fact can be quite vulnerable to sophisticated cyber criminals known as hackers. In early 2008 it was reported that the North East Supermarket mogul, Hannaford Bros. Company fell victim to a computer hacking attack that compromised approximately 4.2 million customer credit cards. This act created a financial nightmare for thousands of consumers and for the Hannaford Bros. grocery company. The incident was a black mark on Hannaford’s public image and a financial burden to their corporation. Cyber Security is a growing priority of today’s business leadership. Boon, Kurtz (2011)
Hannaford Bros. Co.
Hannaford Bros. is an upscale North American grocery retail chain headquartered in Scarborough, Maine. Hannaford was founded in 1883 and now runs supermarkets throughout New England and upstate New York. Hannaford is owned by the American subsidiary of the Belgian Delhaize Group, Delhaize America, the parent company of Food Lion which operates over 1,500 stores on the East Coast, mostly in the Mid-Atlantic States. The Hannaford Bro. Website (2011), The Delhaize Group website (2011)
Hannaford Bros. administers a comprehensive website for their grocery chain. The Hannaford website found



References: 1) Boon, Kurtz (2011) Contemporary Business, New Jersey, John Wiley & Sons Inc. 2) The Hannaford Bro. Website (2011) Retrieved from: http://www.hannaford.com/home.jsp 3) The Delhaize Group website (2011) Retrieved From: http://www.delhaizegroup.com/en/PublicationsCenter/PicturesandBiographies/Stores.aspx 4) Kim Zetter (2010) Hacker Sentenced to 20 years for Breach of Credit Card Pocessor. Retrieved from: http://www.wired.com/threatlevel/2010/03/heartland-sentencing/#more-14740 5) Jaikumar Vijayan (2008) Update: New retail data breach may have affected millions of Hannaford shoppers. Retrieved from: http://www.computerworld.com/s/article/9068999/Update_New_retail_data_breach_may_have_affected_millions_of_ Hannaford_shoppers 6) Jaikumar Vijayan (2008) Hannaford hit by class-action lawsuits in wake of data-breach disclosure. Retrieved from: http://www.computerworld.com/s/article/9070281/Hannaford_hit_by_class_action_lawsuits_in_wake_of_data_breac h_disclosure 7) Michael Neumann (2008) The Rand Corporation: Cybersecurity Economic Approaches and Challenges to Decision Making. Retrieved from: http://www.rand.org/pubs/research_briefs/RB9365-1/index1.html 8) The State of Maine Bureau of Financial Institutions website (2011) Retrieved from: http://maine.gov/pfr/financialinstitutions/data_breach

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Good Essays

    On December 19th Target revealed that 40 million credit and debit card accounts were compromised by a data breach. The information had appeared to be stole around black friday of 2013. This is the busiest shopping day of the year.The retailer said that the information stolen between November 27 and December 15, 2013 included personal information of as many as 70 million people more than the 40 million the company originally estimated. Target discovered the breach on December 13th and notified the justice department.The information stolen included names, mailing addresses, phone numbers and email addresses. The hackers tole 11 Gb worth of personal information. Target said that it will provide one year of free credit monitoring…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ricky and Doughboy family boundaries are not strong enough to keep them off from misbehaving or make them focus on how to get a better life. Consequently, this has resulted in them looking for alternative ways to survive and satisfy the lack that they face currently. The external and internal factors of social understanding can be coupled with sociological theories that deepen the understanding of a family unit. “Most theories about families suggest that families should not only have flexible, clear boundaries with the outside world, but they must also have well-established intergenerational boundaries. In other words, the parents should be partners in parenting the children” (Collins et al, 2013. p. 61). Simply put, parents should play an…

    • 327 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    During Week 2, our team focused our collaborative discussion on different technologies that businesses can use to prevent security breaches and reduce the risk of cyber-attacks they are increasingly experiencing. To aid in our discussion, team member, Jennifer Ashton, posted an article entitled “The Right Technology Fix Can Help Prevent Breaches”, written by author, Tim Horton. Mr. Horton’s article remarked on the rising number of data breaches, how often they affect small businesses, and measures that organizations can employ to avoid future intrusions.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Data security would be a method that corporations use to keep important and confidential information protected. Access to this type of secure information is limited to those who have the authorization to view it. Data security is enforced so that private information that a corporation has about its employees, customers and others that they conduct business with is kept safe from any potential corruption from those who want to use it to their advantage. Many companies go to great lengths to keep their data safe and sound from hackers who can get confidential information from their systems. If a company is not careful and does not protect their confidential information many problems can occur. Some of these problems include identity theft of customers and employees. Hackers can steal information such as social security numbers, addresses, credit card information and many other key pieces of information that can let hackers easily access ones identity. The focus of this research paper would be about the Michaels Stores…

    • 813 Words
    • 4 Pages
    Better Essays
  • Good Essays

    In this document I am going to explain the security issues that every e-commerce possible faces and how to overcome them.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Good Essays

    McGregor, J. P. How the TJX Breach May Change Security Awareness. (2007, April 11). Retrieved October 9, 2007, from https://www.scmagazineus.com…

    • 302 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The essence of global supply chains require that businesses large and small, exchange information of a precarious nature with numerous suppliers, several of which are vastly removed from the manufacturer. A company’s ability to protect sensitive information fluctuates based on the needs of the organization. Businesses and government have all adapted to the world of cyber connectivity, and are all garnering the benefits from social networking and ecommerce. The risks involved with maintaining good cyber-security continue to grow as senior managers and world leaders try to find better sources of dealing with internet predators. Large corporations have intricate supply chains with numerous external suppliers, which make it hard to address all of the risks associated with dealing with each one. With the continued growth of the internet and new information technology, internet scammers have made a concentrated effort to take advantage of any possible weaknesses within a company’s computer infrastructure. Maintaining and enforcing excellent cyber-security measures is at the top of the list for most businesses around the world.…

    • 928 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    References: 1. UMUC (2012).The Future of Cybersecurity Technology and Policy, CSEC 670 (Module 2). Document posted in University of Maryland University College CSEC 670 9042 online classroom, archived at: http://webtycho.umuc.edu…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Best Essays

    5. Goessl, L. (2012). Op-Ed: Nissan recently hacked, corporate hacking a growing issue. Available: http://digitaljournal.com/article/323723. Last accessed 30th July 2013.…

    • 1963 Words
    • 8 Pages
    Best Essays
  • Better Essays

    TECHNOLOGICAL UPGRADES/SOPHISTICATION: TJX found themselves using the Wired Equivalent Privacy (WEP) security protocol for protection, whereas newer and more…

    • 1054 Words
    • 4 Pages
    Better Essays