Tjx Fraud Case Study Solution

Improved Essays
The security problem did not start in July 2005 with the first intruder; this was the hole that did not get filled in time. Early detection of the virus could have prevented widespread infection, but either carelessness or ignorance kept the company from looking. The first major concern is that early detection was not an option or the data that was collected was unused. Next the Customer data was kept in a fashion that could be compromised, either unencrypted or access control was inadequate. This shows a deep level of technological inadequacy by the company, the working technology knowledge of the business owners was too low to avoid risky practices. Older technology made it easier to break, cost saving approaches to technology and use were …show more content…
The most obvious option would be to train every employee and manager about the best security practices and ensure compliance with protocols throughout the organization. This however would do very little without good security policy and guidelines. Hiring or contracting security consultants would be the best way to ensure that the best industry standards are being set, and then an informed managerial staff could reasonably follow and create good security strategies. Another possible avenue for improvement would be to remove many of the older technologies that are more risky. While this may make the employee’s life’s more difficult or tedious as well as being costly, the customer’s data and trust are at stake. Keeping updated and secure databases should be a cost considered when describing the benefits it provides. Short of removing all technology from the business, there is no way to avoid the cost of keeping data secure from hackers. A centralized approach to the problem might be another way to solve the problem. Instead of housing data at each store, datacenters with strict policy, guidelines, and procedures. This would eliminate the need for storeowners to have to worry about most of the security concerns and the focused area could ensure that each store is meeting all requirements and …show more content…
When each member of the organization is accountable for the data they oversee the workers are very likely to start asking the right security questions. The top down approach is effective in some large companies, but is inappropriate for TJX, the scale of the company’s business requires that all levels of the company be wary and cautious of all possible threats. The bottom up approach in an informed system can isolate potential holes in the system, and then the proper management can allocate appropriate resources to the problem. Having every employee involved also ensures that the high level goals of the organization are not undone by the carelessness of an entry level associate. The training is costly in terms of money and time, and making people care about security has been a problem in business for as long as there has been business. In the information age this is no longer an acceptable attitude; every employee is liable because every employee has the capacity and resources to do terrible harm to not just customers but the

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Many of these concerns may be remedied by simply revisiting the company policies and procedures. Data loss is a serious problem. Typically large companies have an automatic data backup in place. Proper automatic backups can be set up daily, weekly, or monthly. For this size company, I would recommend daily backups.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    After analyzing the current situation of accounting firms, it seems that this organization understands the importance of information security but it is severely lacking. This requires to introduce a user training program to make every employee understands the importance of how they behave themselves every day in protecting the company’s network…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    The first being the security of personally identifiable information. Now in this instance the company itself is not fully responsible for this release but they are indirectly responsible. The hackers are directly responsible for the dissemination of the users personal data but the company could have avoided this incident by shutting down but chose not to which directly constitutes a breach of privacy and security proposed by the company to protect the users information. The next issue is the release of users information that paid the company the fee of $19 to delete their information. The company decided not to delete the users information for some reason from their servers.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    When filing electronic or personal health records online, anything is possible in regards to security breaches. Sometimes they can be avoided. Other times hackers are able to crack codes in encrypted data. When this happens, the clinic or hospital is held responsible for patients’ confidential information such as social security numbers and credit cards becoming accessible by an unauthorized third party. In July 2010, the Attorney General’s office was informed of a security breach involving at least 800,000 patients at South Shore Hospital in Massachusetts.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    We want our clients to know that they can count on us to keep their information safe from the outside world; other clients and hackers. Making sure that every server is secure, is one way of ensuring our client’s data will be safe. My recommendations for securing the servers are: Database Server use MySQL, Web Server use Apache, File Server use Samba, SMTP Server use hMailServer, and LDAP Server use OpenLDAP. I recommend securing the database server by using MySQL Enterprise Edition because of the advanced features and management tools it provides. It has technical support that will ensure the highest level of scalability, security, reliability, and uptime are met.…

    • 1249 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Any organization, including ABC healthcare Information technology (IT) infrastructures are exceedingly powerless against potential assaults or harm caused from internal and external threats. Meeting standardize compliance requirements developed by the Sarbanes-Oxley (SOX) Act and the Health Insurance Portability and Accountability Act (HIPAA) is critical to reduce potentials assaults to guarantee their infrastructures are secure to the best degree possible by substituting data frameworks regulations. Technical security recommendations to improve ABC Healthcare information security can enhance their information security without significantly increasing management or cause difficulty in the organization. Healthcare industries store and have…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Visiting websites that are dangerous. If any one of the employees are caught doing these things, not only it will hurt the person that is doing it, but the people around them. That means they will be fired. Accountability…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Pros And Cons Of Anthem

    • 167 Words
    • 1 Pages

    I found your document informative and well-written. I learned a lot about this situation, which is my first time hearing about it. It’s quite concerning because I used to be insured through Anthem, so it’s likely that the hackers accessed my health personal information. In your document, you mentioned that hackers are becoming more sophisticated as technology advances, so do you believe, through your research or your personal belief, that security breaches would cease to exist even if organizations implement strong security measures?…

    • 167 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The aim of this paper is to outline the dynamics of Walters Security. Walters Security’s main objective is to ensure a high level of network and information security for reach client. Customer and client information, payment information, personal files, bank account details- all this information cannot be fully restored once it has been lost or breached by criminals. The goal of this firm is developing an interdisciplinary research platform to develop a framework and provide benefits to eliminate breach-related vulnerability of information.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    As a consultant for Target, I would offer several solutions for the crisis at hand. Being that the hackers entered through a vendor, I would propose a stronger security team. I would also suggest appointing a chief information security officer, as ordered by the judge as a solution in one of many lawsuits (Pagliery & Williams, 2015). I would also suggest additional security training for all levels of employees, primarily because the hackers were able to easily gain access to the system.…

    • 214 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    1. The message I would have received as a hospital administrator from this video would have been: The importance of keeping my organization's information secure from anyone else not permitted to have my knowledge, and more specifically the knowledge of my patient's care as well as their demographic information. It is my responsibility as a hospital administrator to keep my data secure, and whether that means hiring a IT security company or maintaining a high security software is my responsibility in order to stay within HIPPA guidelines. 2.…

    • 477 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays