Preview

Checkpoint: Tjx Companies

Satisfactory Essays
Open Document
Open Document
326 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Checkpoint: Tjx Companies
CheckPoint: TJX Companies

The data theft that TJX Companies experienced was caused by using the Wired Equivalent Privacy (WEP) encryption system. The WEP had become easy for hackers to navigate and had become quite out of date. TJX also failed to properly encrypt data on many of the employee computers that were using the wireless network, and did not have an effective firewall. The company had also purchased additional security programs that were not installed correctly. An alternative to the out of date WEP could have easily been used. The Wi-Fi Protected Access (WPA) standard in conjunction with a sophisticated encryption system could have been used to replace the WEP. Firewalls could have reduced or eliminated the ability of the hackers to gain access to sensitive information. Lastly the company should have ensured that all computers containing customer information were secure when connecting to a wireless network. The cost associated with data breaches can be enormous and infinite. A data breach can have severe repercussions including reputational costs to organization and brand. A data breach can also cause the loss of confidence and apprehension in consumer. This in turn will cause less people to shop with TJX companies which can create a loss in revenue. The consumer can also have charges and unauthorized use of their credit information. Banks and issuers of credit and debit cards were forced to replace the stolen cards and refund any money that was stolen due to fraudulent credit or debit charges. I believe that TJX should have taken full responsibility for that data theft. I think that the biggest moral obligation that was not met is the obligation to securely store customer data. This moral fault has been estimated to cost upwards of one billion dollars. I also believe that TJX should have been held accountable for all damages since it was their lack of security that allowed the hackers to steal the data in the first

You May Also Find These Documents Helpful

  • Powerful Essays

    3. What are the key tenants of the TJX business described in the “Business Overview” in the 10K?…

    • 1051 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Operation Get Rich or Die Tryin' is just one example in a sea of inadequate security measures that is far too common in today corporations. The fact that TJX failed not only to notice the breach, but also to implement basic security measures is concerning enough. However, this inevitably leads us to ask if such a large corporation had this level of neglect, how pervasive is the lack of security in the industry? To answer the question, all we need to do is take a look at last couple of years in the news. We can see from a quick Google search that we've had hacks on Experian, Yahoo (in which I was personally affected), Sony and Uber, just to name a few. These are companies with which we are all familiar. and with vast amounts of capitol at their disposal. Yet somehow they still failed in their responsibility to safeguard some of our most…

    • 724 Words
    • 3 Pages
    Good Essays
  • Good Essays

    tjx company analysi

    • 707 Words
    • 3 Pages

    TJX is the largest international apparel and home fashions off-price department store chain in the United States with 26 million in revenues in 2012. It was founded in 1956 as Zayre and is headquartered in Framingham, Massachusetts. Globally it is one of the top 50 retailers in the world, specializing in cheap apparel and footwear. With over 3,000 stores today, we see the potential to expand our store base by over 50%, up to almost 4,800 stores, with our current chains in our current markets alone. Their target customers are female, middle to upper-middle income, between the ages of 25-54 years that are fashion and value conscious. Beyond our successful brick-and-mortar business, we see expanding our e-commerce presence over time as a great opportunity for TJX and another platform to reach more customers with our great values. According to Forbes it is also #95 on the S&P 500. TJX comprises T.J. Maxx, Marshalls, HomeGoods, Winners, and T.K. Maxx. TJX’s stock price is currently selling at $63.52 significantly hire than the prices we calculated using the Price Earnings Model, Dividend Discount Model, and Discount Cash Flow Model which average out to about $33.39.…

    • 707 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved December 19, 2014, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    TJX Companies Inc. is currently in one of the most secure subsets of the retail industry. The economy is a factor always present in the minds of consumers today, and the retail establishments operated under TJX Companies all cater towards the price conscience customer. They are hitting all ages and genders in the apparel industry in addition to home good products including furniture and accessories. They have expanded to reach many markets, and are continuing their expansion across the United States and throughout international countries in Europe. Their ability to payout higher dividends than the majority of the competitors in their industry, while still expanding their market segment proves their profitability along with their profit margin. The profit margin experienced by TJX has been increasing rapidly. There perfect placement in the marketplace and their successful current performance proves the strengths which lie with TJX Companies Inc. As of right now, TJX should work on growing their revenue to a higher value. Although the company is increasing in revenue from year to year, they have only jumped 4.3%. A possible weakness right now, the company’s current expansion should turn that around. Even still a stagnant revenue is much better than a declining revenue growth, which in this economy is not uncommon. If their revenue is able to grow, than they can focus on reestablishing their previous inventory method. Due to the economy, TJX restructured their inventory system in order to keep a smaller quantity on hand. With larger revenues and more sales, they will be able to profitably keep larger stocks of merchandising inventory on hand. Financial information is all interconnected, balancing and formulating from each aspect. As the economy turns around, sales increase, and revenues increase, the downfalls which TJX has endured will change into even greater profitable quarters.…

    • 1729 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Target a large retail corporation that operates over 1,700 stores across the United States. They also operate as an online retailer at target.com. In 2012 the retailer earned more than $73 billion dollars in revenue and grew their sales by 5.1% from the previous year. Looking at the revenue and sales growth rate it is hard to fathom that more money could not be spent to ensure that consumer data is protected as much as possible. As information security specialists one of the worst things that can happen is our network gets infiltrated and customer information is stolen. On December 19, 2013 Target released a statement stating that they have had an information security breach and suggested that as much as 70 million credit card information had been stolen.…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.…

    • 312 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Week 5 Checkpoint

    • 272 Words
    • 2 Pages

    The banks have been affected the most by the stolen data more so than the retailers, the credit card companies or TJX, and may have to pay up to $300 million to recover stolen credit cards in addition to covering fraudulent purchases. TJX is being sued for not protecting their customers’ information and estimates losses at $1 billion over 5 years. The customers have lost trust in TJX and those polled said they would never again shop at the effected retail stores.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The data breach resulted from Target’s failure to segregate systems handling payment card data from the rest of its network (Bertrand, 2014). The attackers gained access to the company’s network with a username and password stolen from Fazio Mechanical Services who provided refrigeration and HVAC systems for them. With just that information alone, the attackers were able to upload malware programs on Target’s Point of Sale (POS) systems.…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    As seen in the video, criminals stealing hard drives from commercial establishments is becoming more common and holds the opportunity for criminals to steal hundreds of individuals’ credit and debit card information. This growing trend puts the consumer at risk for extra charges on their credit and debit cards as well as identify theft. What is even more surprising is that consumers are unaware of the true risks that are involved in using their card at terminals in stores. Moreover, even though businesses are to swipe the hard drives clean each day, many are failing to complete this proper procedure to prevent consumer’s stolen information. To add, where the consumer’s information was compromised is not made available to the consumer.…

    • 666 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    In my opinion the PCI-DSS standards in place should lead to a secure network and ultimately protect the cardholder data. The Payment Card Industry (PCI) data security standard has important requirements like maintaining a firewall configuration, regularly updating anti-virus software, encrypting transmission of cardholder data across open, public networks to name a few. Unfortunately, the auditing practices at TJX were poor and did not identify the real problems with the TJX systems. The were three crucial issues with the TXJ systems. The first one was the absence of network monitoring; according to the PCI standards, a firewall or a “do not use vendor-supplied defaults for system passwords” was required. They also violated the second PCI standard of protecting the cardholder data by not keeping data logs, and the presence of unencrypted data stored on the system. The stolen information was from old transactions from 2002 which were supposed to be…

    • 853 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    college algebra

    • 1862 Words
    • 11 Pages

    If a company has personal information released, the customers will feel less secure with their banking and will result in a business loss for the company…

    • 1862 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    It is almost impossible to find the top reasons why most security breaches happen on a secure network compromising hundreds to thousands of users’ personal information. This happens today more often than one would like to think and the consequences are astronomical for users, employees and customers of the companies. To protect a network and thoroughly secure confidential information, one has to examine the top vulnerabilities and think outside of the normal box to protect the network. When a security breach happens, there is usually a pretty simple reason why it has happened. This paper will discuss one of the highly publicized security breaches to happen in years, the Sony PlayStation Network & Qriocity music and video service that occurred early this year. There will be a discussion on the actual breach that occurred, what caused the breach and how this could have been prevented, and finally, how Sony plans to recover from this monumental loss of confidential data it caused its customers.…

    • 1165 Words
    • 5 Pages
    Good Essays