Preview

Tjx Security Breach

Good Essays
Open Document
Open Document
1008 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Tjx Security Breach
Case Name: Security at TJX

Problem Statement

How should the new CIO of TJX work to strengthen security around the IT infrastructure to prevent, detect, and analyze security breaches that had previously allowed hackers to steal sensitive data?

Background

1 Describe the company/department

1 History

1 Founded in 1976

2 Operate 8 business under TJX

1 TJ Maxx

2 Marshalls

3 HomeGoods

4 A.J Wright

5 Bob’s Stores

6 Winners

7 Home Sense

8 TK Maxx

3 2400 stores

4 125,000 employees

2 Conditions

1 2006 – 138th on Fortune 500

2 Largest apparel and home fashions retailer in off-price segment

3 $17.4 billion in sales for fiscal year 2006

3 Culture

1 Built on efficiencies, vendor relationships rather than fashion

4 Strengths

1 More than triple the size of closest competitor, Ross Stores, Inc

2 Ability to operate in a low-margin industry and stay profitable

5 Weaknesses

1 IT systems were not up to standards

2 Describe the industry situation

1 Customers

1 Traditional retail shoppers looking for a bargain

2 Span North America and Europe

2 Traditional Competitors

1 Direct

1 Ross

2 Target

3 Kohls

2 Indirect

1 Department Stores (JCPenny, Macy’s, etc)

2 Deep discount stores (Garden Ridge, BigLots)

3 New market entrants

1 Online marketplace

1 Overstock.com

2 Ideeli.com

3 Gilt.com

4 Bluefly.com

4 Opportunities

5 Threats

Key Issues

1 Issue #1: TJX has a subpar security system with multiple failure points

2 Issue #2: TJX will be held financially accountable for distress they have caused the clients and will need to need to set forth a plan to minimize damage to the reputation of their brand(s)

Relevant Areas, Facts, Conclusions

1 Relevant areas for Issue #1

1 Lack of detection systems, electronic or manual

1 When TJX first noticed the issue in Dec of 2006, intrusions had been occurring for at least 16 months,

You May Also Find These Documents Helpful

  • Good Essays

    Global’s risk management approach was a key factor in the success of their efforts to protecting their client’s information assets. By utilizing risk management strategies Global was able to detect vulnerabilities where there were the most likelihood of threat and implement controls to detect and/or prevent breaches of the security controls. The risk management process ensured Global addressed security measures at all levels of the…

    • 515 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The credit card data theft at TJX Companies is considered one of the worst ever. The case is significant because of a lack of appropriate security and control.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    tjx company analysi

    • 707 Words
    • 3 Pages

    TJX is the largest international apparel and home fashions off-price department store chain in the United States with 26 million in revenues in 2012. It was founded in 1956 as Zayre and is headquartered in Framingham, Massachusetts. Globally it is one of the top 50 retailers in the world, specializing in cheap apparel and footwear. With over 3,000 stores today, we see the potential to expand our store base by over 50%, up to almost 4,800 stores, with our current chains in our current markets alone. Their target customers are female, middle to upper-middle income, between the ages of 25-54 years that are fashion and value conscious. Beyond our successful brick-and-mortar business, we see expanding our e-commerce presence over time as a great opportunity for TJX and another platform to reach more customers with our great values. According to Forbes it is also #95 on the S&P 500. TJX comprises T.J. Maxx, Marshalls, HomeGoods, Winners, and T.K. Maxx. TJX’s stock price is currently selling at $63.52 significantly hire than the prices we calculated using the Price Earnings Model, Dividend Discount Model, and Discount Cash Flow Model which average out to about $33.39.…

    • 707 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    The TJX was still using the old wired equivalent Privacy (WEP) encryption system, which is relatively easy for hackers to crack. An auditor also later found the company had neglected to install firewalls and data encryption, on many of the computers using the wireless network,…

    • 667 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Imagine University of Phoenix’s IT department has hired you. Your first task is to make sure the department is following the most important information security practices.…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Term Paper Sec 402

    • 1192 Words
    • 5 Pages

    The Board of Directors request that their information security strategy be upgraded to allow greater opportunities of secure cloud collaboration. Also dress the concerns on the recent number of hack visit attacks that have caused the network to fail across the enterprise. The organization has know brand products across the world and expects top-secret methods for safeguarding proprietary information on its recipes and product lines…

    • 1192 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    It205 Week 5 Checkpoint

    • 272 Words
    • 2 Pages

    TJX could have switched to the more secure Wi-Fi Protected Access (WPA) standard with more complex encryption. TJX had also failed to install firewalls and data encryption on a lot of their computers by using the wireless network, system passwords and should have had good up- to- date antivirus software…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Jarvis, K., & Milletary, J. (2014, January 24). Inside a targeted point-of-sale data breach. Retrieved from http://krebsonsecurity.com/wp-content/uploads/2014/01/Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    During Week 2, our team focused our collaborative discussion on different technologies that businesses can use to prevent security breaches and reduce the risk of cyber-attacks they are increasingly experiencing. To aid in our discussion, team member, Jennifer Ashton, posted an article entitled “The Right Technology Fix Can Help Prevent Breaches”, written by author, Tim Horton. Mr. Horton’s article remarked on the rising number of data breaches, how often they affect small businesses, and measures that organizations can employ to avoid future intrusions.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The massive data breach at Target started on November 27, 2013, and by December Target personnel discovered the breach and notified the U.S. Justice Department. On December 18th, security blogger Brian Krebs broke the story in this post: "Nationwide retail giant Target is investigating a data breach potentially involving millions of customer credit and debit card records," mentioned Krebs. "The sources said the breach appears to have begun on or around Black Friday 2013 -- by far the busiest shopping day the year." (Vijayan, 2014)…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    with IS security policies by signing a compliance agreement that is retained in their personnel…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    You Decide Week 5

    • 537 Words
    • 3 Pages

    Based on the information given I have decided that it is best for the company if we investigate the customer complaints further. I have identified several critical issues that need to be addressed.…

    • 537 Words
    • 3 Pages
    Good Essays