Security Breach Case Study

Improved Essays
Did you know that the average cost of a typical data breach is $5.4 million in the United States? A data breach can take a toll on a company of any size and consumers alike, which is why it is so important for both consumers and companies to take necessary precautions to reduce the risk of breaches.

Security Breaches have a compound impact on both consumers and businesses. Consumers shop with companies under the faith that their personal information will be protected. When a security breach occurs, the consumer faith maybe broken and they may discontinue to do business with them in the future. According to Safenet.com, “Data breaches are not just breaches of security. They’re also breaches of trust between companies and their customers,
…show more content…
A breach involving another existing financial account
3. A breach involving your driver's license number or another government-issued ID document
4. A breach involving your Social Security number

After the type of security breach had been identified, consumers will need to be proactive against identity theft or unauthorized use of their financial information. If their credit or debit card information has been compromised, they will need to take certain steps to ensure no unauthorized use occurs. The most common way to prevent this is to have consumers contact their issuing card company to request cancellation of the card in question and get a replacement.

Breaches involving other financial accounts such as bank, investment and retirement often requires monitoring the activity, possibly closing the accounts, or having new ones created. When government issued IDs are compromised, consumers can have their files flagged to prevent fraudulent IDs being created.

A social security number breach involves more time and effort to prevent identity theft. Monitoring your credit report regularly to ensure new accounts are not being opened is necessary in minimizing identity theft. Credit monitoring firms can assist in monitoring activity on consumer’s credit reports after a breach. Also, consumers can place a security freeze on their credit reports to restrict access to them making it more difficult for thieves to open new

Related Documents

  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Target Security Breach

    • 181 Words
    • 1 Pages

    From a managerial perspective, there were many errors made in handling the December 2013 Target security breach. The first questionable decision for review deals with the effects of poor communication. Chief Executive Gregg Steinhafel hesitates to publicly communicate the breach to consumers (Kinicki & Williams, 2013). The primary law of business is “being responsive to customers” (Kinicki & Williams, 2013, p.12). Furthermore, when the details were communicated, CEO Steinhafel inflated the amount of affected shoppers (Kinicki & Williams, 2013).…

    • 181 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    People that buy products or services online need to feel that their financial and personal information they have given to businesses is secure. Legal consequences of data privacy breaches: A company that stores personal data on their computers systems have a legal obligation to keep that data secure. If personal data is stolen during a cyber-attack and the company can be show to have been negligent in terms of keeping the personal data secure. Then the company could face prosecution under the Data Protection Act and receive a large fine. Malware With these the attacker can use malware to gain or change data malware is software specifically designed to gain access or damage a computer without the user from knowing there are various types of malware such:…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Since then, it seems like data breaches happen every day. It is sad that I do not even remember the Anthem breach. It just blends in with all the others. Between November 27th and December 15th of 2013 Target experienced one of the largest cyber hacks in United States history (Clark, 2014).…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Organization: J.P Morgan Chase Cyber security attack which involved J.P Morgan Chase bank is one of major attacks which took place recently. About two third of the bank’s customer details were stolen in this attack. The Bank officially announced that the data of 83 million customers was hacked out of which there were 76 million household and 7 million small business customers were involved. Key-points of the attack • The data comprises of the information of 83 million Customer details such as name, phone number, address and email address •…

    • 414 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    It is important to know and identify when and how the breach occurred in order to accurately determine who was affected in the breach. Once the breach has been validated, the company needs to assign a manager who will handle the incident and have a response team ready in order to mitigate the problem. This team should handle all actions such as legal, IT, finance, risk management, and even media relations (Privacy Technical Assistance Center, 2012). If the authorities or law enforcement needs to be involved in the breach, then the team will determine whether they need to be contacted for further investigation. Once all the necessary information has been recovered, it is to determine whether the parties involved should be notified and what needs to be done in order to accommodate the persons involved, such as free credit report for a year.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 740 Words
    • 3 Pages

    Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It 1. Who are the stakeholders in the Target breach? The main stakeholders are their shareholders, the clients that had their personal information stolen, and individuals with an ongoing connection with Target organization whose personal information was or might have been compromised. Stakeholders who are affected or worried that they might be harmed start to mistrust the firm and its complacent-sounding promises.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    A credit freeze is a method consumers can use to “freeze” their credit reports, or to keep information about their credit history being released to financial institutions and merchants. In Florida, it costs $10 to enact a credit freeze on a credit report and that fee can be waived in the incident of proven identity theft, according to Experian’s…

    • 808 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cyber Security Case Study

    • 1322 Words
    • 5 Pages

    America’s Cyber Security is at Risk The FBI is going too far, they are not just trying to get into the San Bernardino shooters phone but they are trying to take control and survey private technology. This case is a lot more than what it seems, this argument is about the privacy of information of the American people. If they create the backdoor to the iPhone it would be the same as a master key to a certain kind of door, and why should they be trusted with that power.…

    • 1322 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays