Preview

Security Breach at Tjx

Good Essays
Open Document
Open Document
755 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Breach at Tjx
HBR Case Study
Security Breach at TJX
1. What are the (a) people, (b) work process and (c) technology failure points in TJX’s security that require attention?
While it is known that all retailers, large and small, are vulnerable to attacks, several factors including people, work process, and technology require attention so as to prevent another major attack from hitting TJX.
The people associated with the attack who need attention are the top-level executives and, more importantly, the Payment Card Industry Data Security Standard
(PCI DSS) auditors. Top-level executives need to understand that IT security is a business issue and not just a technology issue. As seen by the attack, an IT security breach can mean hundreds of millions of dollars in losses, which definitely has an adverse affect on the bottom-line of the business. Further, as a Level 1 business (those that processed over six million credit card transactions per year), the PCI DSS auditor had failed to accurately assess TJX’s network, missing three of twelve encryption requirements: absence of network monitoring, absence of logs, and the presence of unencrypted data stored on the system. The lack of thoroughness on the auditor’s part certainly made the penetration of the system by attacks easier, to the point where they were so confident that they would send each other encrypted messages through the backend of the system. Furthermore, the in-store clerks dropped the ball by not monitoring the self-checkout kiosks more heavily, which resulted in attackers using USB drives to upload software on those terminals!
Work process failure points that require attention are the personal information required for non-receipt merchandise returns, such as driver’s license and social security numbers. Either do not allow returns without a receipt or implement a system for nonreceipt returns that does not require the customer to give out very personal information.
Technology failure points at TJX

You May Also Find These Documents Helpful

  • Good Essays

    d) If the store wants to maintain the policy of issuing cash refunds without receipts, one better way to safeguard and to improve its internal control is to have a check mailed to the only customer whom had returned the store’s merchandise for refund regardless of refund amount. Moreover, before a check is prepared, the store manager or super visors must verify that the sale transaction is accurate and the customer must exist.…

    • 710 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    MGT2 Task3

    • 5037 Words
    • 21 Pages

    Negative publicity of the company and loss of credibility in the eyes of existing and potential customers impacting overall business…

    • 5037 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Deloitte Case

    • 253 Words
    • 2 Pages

    — as a reduction of revenue or as a marketing expense? Explain your answer and support it using the FASB Codification. Your answer should include the Codification reference where you found the applicable guidance.…

    • 253 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    LAW 421 Week 5

    • 453 Words
    • 2 Pages

    Legal issues such as those listed can and does feasibly damage consumer, employee and shareholder relations with the company. This can also prevent suppliers from providing the company services and goods because the status and perceived character the company will have because of these issues. Proceeds hurt from this type of harm to these delicate associations and causes harm the integrity of the business.…

    • 453 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    Threats |Confidentiality |Integrity |Availability | |Denial of Service Attack |Low |Medium |High | |Power Supply Failure |Low |Low |High | |Malicious Code Infection |High |High |High | |Theft and Fraud |High |Medium |High | |Website Intrusion |High |High |High | |Unauthorized Data Access |High |High |Low | |The small business and companies should address and take care of the security holes and threats, and it should not be necessarily a complicated and costly process. The small business and companies need to have information security, for the following reasons:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Target a large retail corporation that operates over 1,700 stores across the United States. They also operate as an online retailer at target.com. In 2012 the retailer earned more than $73 billion dollars in revenue and grew their sales by 5.1% from the previous year (“Corporate overview,” 2013). Looking at the revenue and sales growth rate it is hard to fathom that more money could not be spent to ensure that consumer data is protected as much as possible. As information security specialists one of the worst things that can happen is our network gets infiltrated and customer information is stolen. On December 19, 2013 Target released a statement stating that they have had an information security breach and suggested that as much as 70 million credit card information had been stolen (Jarvis & Milletary, 2014).…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    During Week 2, our team focused our collaborative discussion on different technologies that businesses can use to prevent security breaches and reduce the risk of cyber-attacks they are increasingly experiencing. To aid in our discussion, team member, Jennifer Ashton, posted an article entitled “The Right Technology Fix Can Help Prevent Breaches”, written by author, Tim Horton. Mr. Horton’s article remarked on the rising number of data breaches, how often they affect small businesses, and measures that organizations can employ to avoid future intrusions.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    -External matters, including legal proceeding; loss of a key franchise, license, or patent; or loss of a major customer or supplier.…

    • 1560 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Customers may no longer be able to buy the same quality of goods and services if they fail to meet their aims and objectives this will be a big downfall in the business, they could lose customers which will make the business very unsuccessful.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    and how bad would it be? Use the financial information in the case for guidance.)…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    caregroup

    • 721 Words
    • 4 Pages

    network failure, the institutions needs to aggressively deal with security. The cause of this could…

    • 721 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Term Paper

    • 2694 Words
    • 11 Pages

    it is a detractor to others who are thinking about entering your industry because it successfully creates barriers to entry.…

    • 2694 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Riordan Sr-Rm-013

    • 722 Words
    • 3 Pages

    Technology has been growing for the past years. With most of the world population relying on smart phones, computers, tablets for day to day operations, making it easier for one to multitask, it also makes it easier for people with bad intentions to get ahold of information that one wouldn’t want shared. Riordan being a manufacture for multiple products like plastic, heart valves, among others, has become concerned with recent talks about the Sarbanes-Oxley Act. This act also known as “Public Company Accounting Reform and Investor Protection Act” is in short words, enhanced standards for all United States Company to provide accurate of financial information. The company would like to know and conduct security reviews and recommend security issues within the company regarding network, data, and web security issues.…

    • 722 Words
    • 3 Pages
    Good Essays
  • Good Essays

    On May 2, 1011, a week later, a second security breach occurred on a different Sony network. The Sony Online Entertainment Networks was targeted and compromised 24.6 million users. Of that number, 12.3 million had their credit card information stolen.…

    • 584 Words
    • 3 Pages
    Good Essays
  • Better Essays

    In 2013, B2B International and Kaspersky Lab conducted a Global Corporate IT Security Risks survey and the results were quite startling. In a conservative estimate, “The average damage suffered by large companies from a single serious incident was $649,000. For small and medium-sized companies, the average damage was $50,000” ("Global corporate it," 2013). These damages can be the result of fines, lawsuits, as well as lost revenue from customers, who no longer have faith in the security of the company. It takes many years for a business, such as TBWI, to build a reputation, but it can all be lost in a matter of seconds. Because of this, the following security concerns need to be recognized, with a plan in place for prevention.…

    • 1627 Words
    • 5 Pages
    Better Essays

Related Topics