Preview

Case Study Of Target's Data Breach

Powerful Essays
Open Document
Open Document
1301 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study Of Target's Data Breach
During, and leading up to, the recent data breach that occurred at Target, it is evident that many mistakes were made at the executive level. As any company, Target possesses a primary goal of balancing both effectiveness, and efficiency; however, the organization under CEO Greg Steinhafel did not achieve these goals simultaneously. Prior to the data breach experienced by Target, the company primarily focused on efficiency --- the act of determining and implementing the most cost effective method of utilization for products, resources, or personnel (Kinicki and Williams, 2016). This manner of management by the executives did meet the minimum requirements of cyber security set by government regulations; however, it was not not effective enough …show more content…
One of the most important resources that a store can have is their reputation. This means the reputation of the brand itself and of the managers that run the stores and the upper managers that run the company (Sohn & Lariscy, 2012). In this case, Target’s brand reputation has come under fire due to a data breach that allowed thousands of Targets customers information to be stolen, including credit card numbers, email addresses, and even physical addresses. This made customers feel unsafe using their cards at target stores due to identity theft. Then the CEO was honest with the public about what was happening and how the corporation was going to deal with it. There were many different spins to the story and how he actually handled the crisis. I do believe that he took the right approach of being honest with the public because if he had tried to hide it and it leaked out it would have ruined the reputation of the brand and the leaders of the brand. When advising senior management o how to handle this I would suggest that they stayed as honest as possible with the public and promoted their reputation as it directly affects sales across the country. I would advise them to focus on that aspect that their team is being honest with the public and that they wish to keep customers in the loop about how they are fixing the situation and how they intend on keeping it from happening again in the future. I would advise the team to possibly create some type of survey that could be sent out and analyzed to customers on what they believed would be the best approach to fixing this brand reputation and what would make them feel secure again shopping in their stores. This could help senior leaders develop new ways to advertise and build brand loyalty back into the

You May Also Find These Documents Helpful

  • Good Essays

    On December 19th Target revealed that 40 million credit and debit card accounts were compromised by a data breach. The information had appeared to be stole around black friday of 2013. This is the busiest shopping day of the year.The retailer said that the information stolen between November 27 and December 15, 2013 included personal information of as many as 70 million people more than the 40 million the company originally estimated. Target discovered the breach on December 13th and notified the justice department.The information stolen included names, mailing addresses, phone numbers and email addresses. The hackers tole 11 Gb worth of personal information. Target said that it will provide one year of free credit monitoring…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    We live and conduct business in an active asymmetric threat environment. An individual, business or organization must adapt and protect its vital information assets and critical digital infrastructure. Failure to do so is reckless and may be considered as an obvious lack of due diligence for people who have fiduciary and custodial responsibilities.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Aaker, David A. and Joachimsthaler, Erich, Ch 2 & 3, Brand Leadership, The Free Press, 2000, ISBN 0-684-83924-5…

    • 1600 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    The theft of payment card information has become a common issue in today’s society. Even after the lessons learned from the Target data breach, Home Depot’s Point of Sale systems were compromised by similar exploitation methods. The use of stolen third-party vendor credentials and RAM scraping malware were instrumental in the success of both data breaches. Home Depot has taken multiple steps to recover from its data breach, one of them being to enable the use of EMV Chip-and-PIN payment cards. Is the use of EMV payment cards necessary? If P2P (Point to-Point) encryption is used, the only method available to steal payment card data is the installation of a payment card skimmer.…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    From reading the article, I can see where some of Target’s officials made some treacherous mistakes. Even though Target has been business over 50 years, they are still susceptible to the computer hackers of today. So, the main question should be, If Target had everything in place and they were notified of the breech in the security information, why did this happen? (GaleGroup,2014). Was it just pure human error and oversight or was there a bigger failing plan? Nevertheless, CEO Steinhafel, was looking out on behalf of the public consumer, when he chose to tell Americans exactly how many accounts had been possibly hacked instead of allowing his staff to have him report a lower number. (Kinicki & Williams, 2016). He chose to show true integrity…

    • 191 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    As Target continues to respond to the security breach that has now been estimated to affect up to 110 million people by NBC News.com, analysts continue to zero in on the statements and actions by CEO, Gregg Steinhafel. And positively so. In the Wall Street Journal article titled, “Target Tried Antitheft Cards,” authors Paul Ziobro and Robin Sidel highlight statements now being made by Steinhafel and actions taken in the past concerning chip-based credit cards. Although the article states that Target pulled the plug on a $40 million, three-year program proposed to better protect shoppers a decade ago, it is apparent that Target may not be to blame.…

    • 439 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Marks Spencer

    • 9814 Words
    • 38 Pages

    For managers at Marks & Spencer the year 2000 was turning out to be a less than auspicious…

    • 9814 Words
    • 38 Pages
    Powerful Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    Data breaches and cyber-attack frequency has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and a company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of a Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident.” (Ponemon Institute, 2013)…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Imc Plan for Pringles

    • 4874 Words
    • 20 Pages

    'In revitalising the brand, the goal is not only to generate added sales levels but to have…

    • 4874 Words
    • 20 Pages
    Powerful Essays