Tjx Company Case Study

Great Essays
Introduction and case background
TJX Companies Incorporated (TJX) was founded in 1976 and includes six separate business concentrating on the off-price segment of the apparel and home fashion retail market. Altogether, it has over 2,400 stores and 125,000 associates and is the largest such retailer in the United states. TJX focuses on obtaining branded goods at low prices by purchasing wholesale from manufacturers and excess stock from department and specialty stores. This allows TJX to sell items at 20 to 70 percent their usual cost. Since the profit margin is small, TJX’s specialty is in utilizing information systems to maintain operational efficiency, vendor relationships, and scale along the entire value chain. In late 2006, TJX discovered
…show more content…
It is able to leverage its profits and reputation to achieve goals that its competitors can’t. However, as a result of the 2006 data breach, this strong foundation is threatened. Significant financial loss has occurred because of lawsuits and remediation, and lowered consumer trust adversely impacted sales and TJX’s public image. The draw of data will continue to attract hackers in the future as well. Several weaknesses allowed the data breach to occur. First, attackers were able to obtain credit card numbers because they held the decryption key for the encryption software used at TJX to process credit cards. Second, wireless eavesdropping on the various computer devices at a Marshall’s store in St. Paul, Minnesota allowed attackers to gain access to TJX’s central database in Framingham, Massachusetts. Second, in-store kiosks were vulnerable to software loaded onto USB drives and the firewalls were not configured to protect against threats originating internally. Finally, lack of sufficient logs made forensic analysis difficult, if not impossible, to …show more content…
Currently, information security is seen as a technology issue, not a business one. If this continues to be the case, TJX will simply patch the holes that allowed the 2006 breach to occur, but not much beyond that. A passive approach will continue to be taken regarding customer data, creating the opportunity for future data breaches to occur. Since this would not require much change on the part of TJX. However, TJX could also take a more aggressive approach to protecting customer data. Not only would the issues with the current systems that allowed the data breach be patched, but new ones could be discovered and fixed by a special taskforce within the company. While this would involve some upfront and ongoing costs, as well as some potential restructuring, this would increase customer trust and help prevent future

Related Documents

  • Improved Essays

    Solomon Garber BPL 5100 - Prof. LaManna - Individual Case Study Case# 275 Interboro, once a small manufacturer of scalpels and other surgical equipment, became the world’s best-known maker of prosthetic limbs and surgical implants under the leadership of Jack Dodson. The structure of the company, under Dodson, was very unique. As CEO, Dodson would routinely conceive new product ideas, go directly to his R&D department and see the product through from inception to completion. In the following case study analyses, I will analyze what went wrong with Interboro, as well as advise Ms. Francesca Fortas on the appropriate direction to take the company as she takes over from Mr. Dodson.…

    • 712 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Many of these concerns may be remedied by simply revisiting the company policies and procedures. Data loss is a serious problem. Typically large companies have an automatic data backup in place. Proper automatic backups can be set up daily, weekly, or monthly. For this size company, I would recommend daily backups.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    The first being the security of personally identifiable information. Now in this instance the company itself is not fully responsible for this release but they are indirectly responsible. The hackers are directly responsible for the dissemination of the users personal data but the company could have avoided this incident by shutting down but chose not to which directly constitutes a breach of privacy and security proposed by the company to protect the users information. The next issue is the release of users information that paid the company the fee of $19 to delete their information. The company decided not to delete the users information for some reason from their servers.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Company Overview Carey John founded CJ’s Brewing Company in 1997. “CJ’s is all about brewing Michigan made beer, single-handedly and offering a variety of delicious beer-friendly dishes made with the freshest hops and ingredients” (CJ’s Brewery, 2015). Restaurants in the corporate organizations demand a specific hierarchy of positions in order to cater to all the emerging needs of the customer service business. The primary purpose of the case study is to present CJ’s Brewing Company’s business structure, leadership and management style, and how to increase productivity. Current Business Structure & Management CJ’s Brewing Company has many levels of management to maintain smooth business operations.…

    • 1355 Words
    • 6 Pages
    Great Essays
  • Great Essays

    The Equifax disaster points to a much bigger problem. -Rhetorical Analysis This is a rhetorical analysis of the article “The Equifax disaster points to a much bigger problem” written by Herbert Lin. Let us start with the writer himself; he is a senior research scholar for cyber policy and security at the Center for International Security and Cooperation (CISAC) and Hank J. Holland fellow in Cyber policy and Security at the Hoover Institution both of which are located at Stanford University.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Pros And Cons Of Anthem

    • 167 Words
    • 1 Pages

    I found your document informative and well-written. I learned a lot about this situation, which is my first time hearing about it. It’s quite concerning because I used to be insured through Anthem, so it’s likely that the hackers accessed my health personal information. In your document, you mentioned that hackers are becoming more sophisticated as technology advances, so do you believe, through your research or your personal belief, that security breaches would cease to exist even if organizations implement strong security measures?…

    • 167 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Data breaches caused by illegal hacking at Target were in themselves tragedies and worrisome events; not only for the company, but for the customers in general who shop at the store locations nation-wide. However, considering various steps taken by Target upon realization of the breaches, it is hard to defend or picture exact wrongful doings or violation of laws by Target. Let’s keep in mind that electronic data and information breaches are hard to prevent; this is mostly due to interconnectivities of globally devices. As such, laws do not persecute companies for hackers breaking into their networks; instead, there are laws binding companies to put required secure methods and practices in place to mitigate hacking or data thefts; also, once a breach is noticed, laws require that such incident be reported immediately and those affected be notified. Here's what happened after; "Target alerted authorities and financial institutions immediately after we discovered and confirmed the unauthorized access, and we are putting our full resources behind these efforts.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Trader Joe’s is a highly competitive retailer that has some interesting differentiating components thus making them a highly effective and efficient retailer. Although Trader Joe’s does many things extremely well, there are some key component that set their company above the competition. Some of these key components include, highly selective products, low prices, distinct target market, store environment, and privacy and secrecy both in management style and in vendor/supplier interaction. Each of these key components bounce off each other creating a strategy that has proven to be both effective and efficient in an industry that contains giants such as Walmart and Costco. Having highly selective products at low prices with a one of a kind environment,…

    • 1664 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    Target Security Breach

    • 181 Words
    • 1 Pages

    From a managerial perspective, there were many errors made in handling the December 2013 Target security breach. The first questionable decision for review deals with the effects of poor communication. Chief Executive Gregg Steinhafel hesitates to publicly communicate the breach to consumers (Kinicki & Williams, 2013). The primary law of business is “being responsive to customers” (Kinicki & Williams, 2013, p.12). Furthermore, when the details were communicated, CEO Steinhafel inflated the amount of affected shoppers (Kinicki & Williams, 2013).…

    • 181 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    In regards to the data breach, Target is facing the issue of managing for competitive advantage and managing for information technology. In order to successfully manage for competitive advantage, Target must put their customers first, remain innovative, and provide a high-quality product or service while remaining efficient (Kinicki, Williams, 2016, p. 37). Initially, Target failed to put their customers first by neglecting to protect their customer’s personal information, affecting the quality of Target’s services. Upon discovery of the data breach, CEO Steinhafel immediately places his customers first with his plan to remediate the issue.…

    • 284 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Target Corporation – Marketing Strategy Product and Price The Target Corporation strives to provide the customer with an exceptional shopping experience by consistently providing quality discount goods and services. All stores sell general merchandise – items that a shopper would use on a daily basis, such as toiletries, cleaning supplies, various electronics, and clothing, food, and services such as photography, eye care, pharmacy, and clinical. Types of food, merchandise, and services differ according to location and store type.…

    • 814 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    P'kolino Case Study 1. Does the business plan tell a coherent and compelling story? P'kolino is a company that was founded by Antonio Turco-Rivas and J.B. Schneider with the mission of developing quality and innovative products that are designed for children that enhance their play while at home (Bygrave, Corbett & Zacharakis, 2017). In addition, the company aims to grow and develop its product based on stages of a child’s development. Based on this, P'kolino’s business plan tells a coherent and compelling story as it gives the summary of the objectives of the company and its marketing strategy.…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The core competencies of Johnson and Johnson (J&J) are: innovation, extensive collaborations, and corporate culture. By understanding that investing in innovations would increase its leadership position, J&J has been spending heavily on research and development (R&D) for many years. They are now among the world’s top spenders in R&D with approximately 12 percent of its sale revenues invested in 9,000 scientists who currently work in research laboratories around the world. There are currently four J&J innovation centers located in Boston, California, London, and Shanghai. Extensive collaborations is another core competency that helps J&J dominate the health-care market.…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays