Data Breach Case Study

Decent Essays
Data breaches and cyber attacks have become increasing more common, last year there were huge data breaches at large companies such as Target, Sony, Ebay, P.F. Chang’s, Domino’s pizza and many many more (McGregor, 2014). According to ITRC, 2015, “The number of U.S. data breaches tracked in 2014 hit a record high of 783 in 2014.” (para. 1) When a data breach occurs it means that sensitive data has been viewed, stolen or otherwise used by party that did not have authorization to that data. Data breaches have become so commonplace that it is more common to have been breached than to not. It is the responsibility of the company collecting the data to protect the information received from customers. Companies should take precautions and minimize …show more content…
Computer and software security includes strong passwords with ninety day expiration, firewalls, anti-virus and malware software, encryption and monitoring updates and patches. Physical security measures include, safes, locked cabinets, shredders and surveillance. As crucial as it is to implement physical and computer security, it is just as critical to train employees on the procedures and the proper use of the provided tools. Ongoing security education and instruction will help to prevent careless mistakes that can lead to vulnerability and breach. Creating and maintaining an incident response plan as well informing employees of its existence is significant. In the chaotic incident of a data breach a guide and listing of steps will assist in the process.
It is also imperative to define security requirements upfront with vendors and other third party service providers. It may be necessary to acquire outside services to uphold and maintain appropriate security measures to comply with certain state and federal regulations. Ensuring that the company maintains control of data at all times, especially with data storage or services, is
…show more content…
Reputation, productivity, and profitability can all be negatively impacted in the aftermath of even a single incident. If a data breach results in actual identity theft or other financial loss, the offending organization may face fines, civil or criminal prosecution. In case that a breach does occur it is important to immediately reference the incident-response plan. Time is of the essence, acting quickly can shut down further damage either by the offender or by noncompliance of state and or federal regulations. Failure to act promptly could lead to both increased regulatory scrutiny and liability. The immediate goal is to minimize reputation damage and customer hardship, offering credit monitoring might help to prevent further damage to clients and restore a sense of

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    According to a report by USA Today’s Elizabeth Weise, an astounding 43% of businesses had been hacked in 2014 and they don’t seem to be slowing down (Weise, 2014). It is important to expand further on the Target store breach of 2013.…

    • 946 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The aim of this paper is to outline the dynamics of Walters Security. Walters Security’s main objective is to ensure a high level of network and information security for reach client. Customer and client information, payment information, personal files, bank account details- all this information cannot be fully restored once it has been lost or breached by criminals. The goal of this firm is developing an interdisciplinary research platform to develop a framework and provide benefits to eliminate breach-related vulnerability of information.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    After the incident, the data handlers encrypt the information before storing it or transferring it, to ensure that it is secure and can’t be accessed even if it is lost. An example of mis-sold services would be between 2010 and 2013 Santander mis sold investment plans and didn’t explain the investment opportunities to mostly pensioners, most of which were advertised as well established and would double back their money, but in reality were not even proper companies and a lot of the people never saw their money again. When the incident was found out, Santander reimbursed those out of pocket, but this also lead to an increase in…

    • 684 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The HIPPA Privacy Rule Are medical records really private and is there a difference between the Health Insurance Portability and Accountability Act (HIPPA) and the Privacy Rule? In essence, the two are the same. However, the main difference is that the HIPPA Act, enacted in 1996, was not signed into legislation after the Department of Health and Human Services (DHHS) applied pressure to enforce the privacy issues within the medical field (Bethel University, 2015). Since legislation did not pass this law after the three-year time limit, in 2003, DHHS then broadcasted a specific set of rules concerning the use and disclosure of medical records, requiring health care providers to comply. In premise, the HIPPA act is nothing more than a disclosure…

    • 827 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    CSE 543: Individual Report

    • 1293 Words
    • 6 Pages

    We have done detail analysis of each and every entity in our report. The defense against attacks can occur only when the attack is known so that preventive measures can be put into motion. We have involved all the countermeasures White hat can use to prevent attack against Black hat. Recent anthem data breach affected 80 million individuals received multi-day coverage, sending shockwaves through the nervous public. This breach highlights the growing threat healthcare industry is facing.…

    • 1293 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 740 Words
    • 3 Pages

    Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It 1. Who are the stakeholders in the Target breach? The main stakeholders are their shareholders, the clients that had their personal information stolen, and individuals with an ongoing connection with Target organization whose personal information was or might have been compromised. Stakeholders who are affected or worried that they might be harmed start to mistrust the firm and its complacent-sounding promises.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction According to http://searchsecurity.techtarget.com/definition/data-breach , “A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property.” Many people experienced a data breach if they shopped in Target stores between November 27 and December 15, 2013. According to Washington Post, more than 70 million customers not only might have had their personal information compromised but also their card data stolen.…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    1. Purpose After several security incidents Greiblock Credit Union (GCU) Board of Directors needs a sound policy to address the situation. The main objective of this document is to improve the security culture of the organization. The specifications of this policy will address dynamic vulnerability analysis, intrusion detection, and incident response.…

    • 1879 Words
    • 8 Pages
    Great Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    As an expert in identity theft, the author exposes a business owner’s case in which the business’ computer system is compromised.…

    • 170 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    The basic protection of data depends on update the anti-malware protection, firewall, and encryption. Creating some security awareness programs. All the people should maintain the data confidentiality and data integrity. In each organization…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Small Security Breach

    • 556 Words
    • 3 Pages

    The divulgence of a small business’s secrets is one of the worst things imaginable. Unfortunately, data security breaches are happening more often. “But I have a small business,” you’re thinking. “No one would take the time to hack into my systems and steal my information.”…

    • 556 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays