Preview

The Tjx Company

Satisfactory Essays
Open Document
Open Document
344 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Tjx Company
The TJX company did not have many security controls put in place to prevent something like this from happening. The company used Wired Equivalent Privacy encryption system to handle their client’s credit and debit card information. This system was very easy for any hacker to gain access to people’s information. It was completely out of date and did not encrypt anything within the company, which made it more vulnerable. They did not install firewall security correctly. TJX had purchased many other security programs that were not properly installed. They kept customer’s information in their system longer than what is required by law.

TJX could have switched to WiFi Protected Access (WPA) to encrypt their client’s personal data information, but failed to do so. This system is much more sophisticated that the previous system and it encrypted everyone’s information, because it was more complex. Firewalls should have been installed correctly because it could have been prevented and would have saved the company the embarrassment of knowing that their system was not safe. This data should have been protected when transferring information over a wireless connection.

The business effect of TJX’s data loss will cost them significantly. Because of their incompetence of not installing the proper software needed to ensure customer’s information, this will cost them $202 million to deal with the theft and the lawsuits brought on. They agreed to strengthen their system security and agreed to have third-party auditors to check their security features every 2 years, for the next 20 years. There was research conducted by a company called Forrester Research, which estimated that their business would cost them $1 billion for the next five years. This finding was based on the cost of additional marketing, security upgrades, consultants, and attorney fees.

The moral dimension that may be applied is the fact that they need to ensure that the customer’s information is secure

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    In my opinion the PCI-DSS standards in place should lead to a secure network and ultimately protect the cardholder data. The Payment Card Industry (PCI) data security standard has important requirements like maintaining a firewall configuration, regularly updating anti-virus software, encrypting transmission of cardholder data across open, public networks to name a few. Unfortunately, the auditing practices at TJX were poor and did not identify the real problems with the TJX systems. The were three crucial issues with the TXJ systems. The first one was the absence of network monitoring; according to the PCI standards, a firewall or a “do not use vendor-supplied defaults for system passwords” was required. They also violated the second PCI standard of protecting the cardholder data by not keeping data logs, and the presence of unencrypted data stored on the system. The stolen information was from old transactions from 2002 which were supposed to be…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    customer 's information. Ethics must be upheld in order for the company to proceed with…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    And did not properly install another layer of security software it had already purchased .TJX also retained card hold data in its system much longer then stipulated by industry rules for storing such data. This company had very little security controls in place at all. The weakness of having a system that TJX had in place are a hacker can gain unauthorized access by finding weakness in the security protections employed by Web sites and computer systems, often taking advantage of various features of the Internet that make open system that is easy to use another problem is a hacker can install a sniffer which is eavesdropping program that monitors information over the internet so they can find personal information haw they want to.…

    • 667 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Jva Corporation

    • 638 Words
    • 3 Pages

    .Performance, as well as revenue, is reviewed every 6 months. This way it allows JVA Corp. to cut or increases pay every 6 months and review its bottom line. Employees can also benefit by having the opportunity to earn pay raises potentially twice a year, rather than the typical annual reviews.…

    • 638 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Identity theft is the one of the biggest concerns. If a person becomes a victim of identity theft, then it is almost impossible to prove innocence. Therefore, the customers should be informed about such attacks that can take place. They need to know the consequences of using online softwares and how to tackle them. Another thing that the organizations can adopt is the authentication and authorization technologies. This will make sure that the hackers are unable to steal the data. They should also put up resistive technology in place like firewalls, content filtering and encryption. These technologies should be of the highest quality.The strength of the passwords should be really strong. If any suspicious movement of data is found, then the organization must take an immediate step and not take it lightly. Lastly, they should devise an information security plan to protect their…

    • 588 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    This company needs to look at for the future, for data loss prevention to be effective, the company must decide on the right strategy, employ the right people, target the right data and purchase the right technology. With these accommodations this should reduce the likelihood and cost of future data, breaches and or violating compliance, rules and laws and or regulations. This will also allow the company to have control over how and what data is being exported and what employees or students are online and how this data is used throughout this company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Final

    • 2332 Words
    • 10 Pages

    Customers trust this organization with highly private personal and financial information. That makes it our responsibly to handle that information with the utmost respect and care. Through the controls and procedures outlined in this policy we can achieve those goals.…

    • 2332 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    btec ict level 3

    • 870 Words
    • 4 Pages

    Security – This is when there are numbers of different ways to secure customers and websites information, this should make sure that they are able to adopt this to reassure their customers.…

    • 870 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    The information stored by an organisation must be kept safe and secure at all times. This is to make sure that the organisation satisfies all of the legal requirements relating to the information which it keeps. The organisation has a duty of care to safeguard the information in its possession. This is to protect the security of its customers as well as its staff.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The Timken Company

    • 4910 Words
    • 20 Pages

    The case is best suited as a firm-valuation exercise in a first-year MBA finance course. It…

    • 4910 Words
    • 20 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Xmgt 216 Code of Ethics

    • 264 Words
    • 2 Pages

    * One of the most important things is to always ensure the confidentiality of all customers and employees information. We are trusted with their information and need to prove why we can be trusted by placing a high standard on the security of all…

    • 264 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    As seen in the video, criminals stealing hard drives from commercial establishments is becoming more common and holds the opportunity for criminals to steal hundreds of individuals’ credit and debit card information. This growing trend puts the consumer at risk for extra charges on their credit and debit cards as well as identify theft. What is even more surprising is that consumers are unaware of the true risks that are involved in using their card at terminals in stores. Moreover, even though businesses are to swipe the hard drives clean each day, many are failing to complete this proper procedure to prevent consumer’s stolen information. To add, where the consumer’s information was compromised is not made available to the consumer.…

    • 666 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Keebler Company

    • 894 Words
    • 4 Pages

    The founhder of the company, Godfrey Keebler, started with jus a small bakery in Philadelphia, PA in 1853. During the next two generations, local bakeries popped up around the country, including Strietmann, Hekman, Supreme and Bowman. With the introduction of cars and trucks (carrying the Keebler logo), bakery goods could be distributed beyond the neighborhood and regional distribution began.…

    • 894 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NCFE LEVEL 2 UNIT 2

    • 737 Words
    • 3 Pages

    This is in protecting the rights and promoting the interests and independence of service users. Respecting dignity, privacy, culture and religion of service users. Maintaining the trust and confidence of the service users by keeping confidential information except the one that will pose danger to them.…

    • 737 Words
    • 3 Pages
    Satisfactory Essays