Target Security Breach

Decent Essays
From a managerial perspective, there were many errors made in handling the December 2013 Target security breach. The first questionable decision for review deals with the effects of poor communication. Chief Executive Gregg Steinhafel hesitates to publicly communicate the breach to consumers (Kinicki & Williams, 2013). The primary law of business is “being responsive to customers” (Kinicki & Williams, 2013, p.12). Furthermore, when the details were communicated, CEO Steinhafel inflated the amount of affected shoppers (Kinicki & Williams, 2013). The communication errors during this crisis sent the wrong message to customers during the busy holiday season. Lack of and miscommunication during a crisis can damage a company’s reputation significant

Related Documents

  • Improved Essays

    On December 2014, Anthem’s databased was compromised by someone that used their credentials to run a query. The breach was not discovered until January 2015. Anthem Inc. security breach was made public in February 2015, and affected at least 80 millions of people. Anthem was at the moment the second-largest health insurance company in the nation. Their president and CEO, Joseph Swedish said to the media: “Anthem was the target of a very sophisticated external cyber-attack.…

    • 552 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    When filing electronic or personal health records online, anything is possible in regards to security breaches. Sometimes they can be avoided. Other times hackers are able to crack codes in encrypted data. When this happens, the clinic or hospital is held responsible for patients’ confidential information such as social security numbers and credit cards becoming accessible by an unauthorized third party. In July 2010, the Attorney General’s office was informed of a security breach involving at least 800,000 patients at South Shore Hospital in Massachusetts.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Target received red flags right before the actual attack. Due to common cyber crimes target was already aware of the threats that happen so they installed $1.6 million malware detection tool Fireeye. They also had a team of security specialists in Bangalore and Minneapolis who monitor its computers around the clock. Fire eye did its job and notified them on multiple occasions about the incident that’s going to happen; unfortunately security team appears to have made wrong call. "…

    • 332 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Well before the breach on Target, the company had already been receiving alerts. Evidently, the company’s million-dollar investment of FireEye’s did what it was supposed to do by alerting Target on numerous occasions (Riley, M., Elgin, B., Lawrence, D.). The worst part about this attack was that it was done by “script kiddies”, which is a person who basically uses other people’s scripts and codes to hack into computers. Overall Target had what they needed as far as security tools to keep this from happening, but an employee didn’t do what was necessary. It could very well be that the staff was not properly trained on roles and responsibility; this in turn led to the passivity of the alerts that were sent.…

    • 216 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Data breaches caused by illegal hacking at Target were in themselves tragedies and worrisome events; not only for the company, but for the customers in general who shop at the store locations nation-wide. However, considering various steps taken by Target upon realization of the breaches, it is hard to defend or picture exact wrongful doings or violation of laws by Target. Let’s keep in mind that electronic data and information breaches are hard to prevent; this is mostly due to interconnectivities of globally devices. As such, laws do not persecute companies for hackers breaking into their networks; instead, there are laws binding companies to put required secure methods and practices in place to mitigate hacking or data thefts; also, once a breach is noticed, laws require that such incident be reported immediately and those affected be notified. Here's what happened after; "Target alerted authorities and financial institutions immediately after we discovered and confirmed the unauthorized access, and we are putting our full resources behind these efforts.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Another even that occurred in 2013 is the now infamous data breach. This incident threatened the future trust of Target’s core consumers. The criminals hacked into Target systems gaining access to customers debit and credit card information endangered Target’s standing amongst even its most loyal guests. Following the breach, Target experienced weaker than expected sales immediately following the announcement of this data breach that occurred in the fourth quarter of 2013 that can be seen from the negative percentage sales growth line item (10-K 5). Fiscal 2015 included the following notable items: Target sold their pharmacy and clinic business to CVS, recognizing a pretax gain of $620 million.…

    • 176 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Most people can remember the Target breach, whether they were affected by it or not. Personally, this was the first big data breach that I remember, and I was one of the millions affected by it. While I do not shop at Target often of course I bought one thing from the store during the time of the breach. I was a nervous wreck, my wife was even worse. Luckily the only thing affected was our nerves and not our personal identities.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    Product-Harm Crisis Paper

    • 1125 Words
    • 5 Pages

    Introduction: Product-Harm Crisis In 2009 the Toyota Corporation encountered a major public crisis. Recalls concerning faulty accelerator peddles which resulted in accidents and fatalities challenged Toyota’s reputation and dependability. The event with the fatal crash in 2009 that led to public outcry was the release of the 911 call that was made from the vehicle. Product-harm crisis occurs when an organization’s products are found to be flawed, unhealthy, or perilous.…

    • 1125 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Target Corporation enhances its information warehouses with latest big data that is technologically sophisticated to crunch large data using complex algorithms and provide vital output data for a daily operation as well as strengthen its capabilities over its rival which is a competitive advantage and speed up worker productivity. A quality tracking tool provided by an information system tracks each package, parts ensuring the goods meet the quality standard. Target Corporation allocated large budget to upgrade the information system as part of a roadmap to transform business (Target Roadmap, 2015). The internal information system supports demand forecasting for accurate inventory, provides relevant analytics capabilities to varies internal…

    • 1009 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    In the year 2013, one of the biggest retail data breaches in history occurred, where Target lost the credit and debit cards of over 40 million customers, along with the personal information of 70 million customers. It all started right before Thanksgiving on November 27, when someone installed malware in Target’s security and payments system that was designed to steal every credit card used at the company’s many stores throughout the United States. When a shopping item was scanned and the cashier processed the credit card number, the malware would apprehend the number, then store it on a Target server hijacked by the hackers (Riley). This went unnoticed for three days until the hackers uploaded extraction malware to move the stolen data, and…

    • 1774 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    We are Market Basket by Daniel Korschun and Grant Welker tells the story of how a solidified company culture set the base for employees and customers to bring back a CEO through protests and determinization. We are Market Basket brought new insight to the factors that allowed for this historical outcome to happen. Although I lived close to where this happened, I only knew that after some time the protesters won and Arthur T. become the CEO again. The proximity to where the protested occurred sparked my interest. I knew about the company and location so I was able to connect the book more than if it was located somewhere else.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Tylenol Crisis Case Study

    • 1010 Words
    • 5 Pages

    Johnson and Johnson (JnJ) is the world’s sixth-largest customer health company, the world’s best all-inclusive medical devices business; also, the world’s sixth-largest biologics corporation and the world’s fifth-largest pharmaceuticals firm. JnJ headquarters is in New Brunswick, New Jersey; it has over 265 companies operating in more than 60 countries, employing over 126,000 persons (Johnson and Johnson, 2015). In this paper, I will discuss the 1982 cyanide-laced Tylenol crisis that hit JnJ and their crisis management response. Starting with their responsiveness, spokesman, and message, continuing to their publics, and planning, then, their ethics, recovery strategy, and their overall results.…

    • 1010 Words
    • 5 Pages
    Improved Essays