Preview

Tjx Security Breach

Good Essays
Open Document
Open Document
1008 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Tjx Security Breach
Case Name: Security at TJX

Problem Statement

How should the new CIO of TJX work to strengthen security around the IT infrastructure to prevent, detect, and analyze security breaches that had previously allowed hackers to steal sensitive data?

Background

1 Describe the company/department

1 History

1 Founded in 1976

2 Operate 8 business under TJX

1 TJ Maxx

2 Marshalls

3 HomeGoods

4 A.J Wright

5 Bob’s Stores

6 Winners

7 Home Sense

8 TK Maxx

3 2400 stores

4 125,000 employees

2 Conditions

1 2006 – 138th on Fortune 500

2 Largest apparel and home fashions retailer in off-price segment

3 $17.4 billion in sales for fiscal year 2006

3 Culture

1 Built on efficiencies, vendor relationships rather than fashion

4 Strengths

1 More than triple the size of closest competitor, Ross Stores, Inc

2 Ability to operate in a low-margin industry and stay profitable

5 Weaknesses

1 IT systems were not up to standards

2 Describe the industry situation

1 Customers

1 Traditional retail shoppers looking for a bargain

2 Span North America and Europe

2 Traditional Competitors

1 Direct

1 Ross

2 Target

3 Kohls

2 Indirect

1 Department Stores (JCPenny, Macy’s, etc)

2 Deep discount stores (Garden Ridge, BigLots)

3 New market entrants

1 Online marketplace

1 Overstock.com

2 Ideeli.com

3 Gilt.com

4 Bluefly.com

4 Opportunities

5 Threats

Key Issues

1 Issue #1: TJX has a subpar security system with multiple failure points

2 Issue #2: TJX will be held financially accountable for distress they have caused the clients and will need to need to set forth a plan to minimize damage to the reputation of their brand(s)

Relevant Areas, Facts, Conclusions

1 Relevant areas for Issue #1

1 Lack of detection systems, electronic or manual

1 When TJX first noticed the issue in Dec of 2006, intrusions had been occurring for at least 16 months,

You May Also Find These Documents Helpful

  • Good Essays

    Global’s risk management approach was a key factor in the success of their efforts to protecting their client’s information assets. By utilizing risk management strategies Global was able to detect vulnerabilities where there were the most likelihood of threat and implement controls to detect and/or prevent breaches of the security controls. The risk management process ensured Global addressed security measures at all levels of the…

    • 515 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Term Paper Sec 402

    • 1192 Words
    • 5 Pages

    The Board of Directors request that their information security strategy be upgraded to allow greater opportunities of secure cloud collaboration. Also dress the concerns on the recent number of hack visit attacks that have caused the network to fail across the enterprise. The organization has know brand products across the world and expects top-secret methods for safeguarding proprietary information on its recipes and product lines…

    • 1192 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The credit card data theft at TJX Companies is considered one of the worst ever. The case is significant because of a lack of appropriate security and control.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    TJX Maxx Code Of Conduct

    • 1247 Words
    • 5 Pages

    TJX like many large corporation are broken down by their teams which they refer to as governance. Of this team you have, the executive committee, executive compensation committee, audit committee, finance committee and corporate governance committee. According to their corporate governance they claim, "As part of our governance practices, we are committed to high standards of ethics, which are reflected in our Associate Global Code of Conduct, Code of Ethics for TJX Executives, Director Code of Business Conduct and Ethics, and Corporate Governance Principles."…

    • 1247 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    The TJX was still using the old wired equivalent Privacy (WEP) encryption system, which is relatively easy for hackers to crack. An auditor also later found the company had neglected to install firewalls and data encryption, on many of the computers using the wireless network,…

    • 667 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Imagine University of Phoenix’s IT department has hired you. Your first task is to make sure the department is following the most important information security practices.…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Jc Penny

    • 1978 Words
    • 8 Pages

    This is not the first time that this company has been faced with adversity. The first time was in the 1960’s when shopping went from downtown locations to more uptown locations in malls. The company transitioned to mall locations to cope with the change. This time the change did not come easy to the company. In fact this change has cost the company millions.…

    • 1978 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    with IS security policies by signing a compliance agreement that is retained in their personnel…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    You Decide Week 5

    • 537 Words
    • 3 Pages

    Based on the information given I have decided that it is best for the company if we investigate the customer complaints further. I have identified several critical issues that need to be addressed.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Jarvis, K., & Milletary, J. (2014, January 24). Inside a targeted point-of-sale data breach. Retrieved from http://krebsonsecurity.com/wp-content/uploads/2014/01/Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The massive data breach at Target started on November 27, 2013, and by December Target personnel discovered the breach and notified the U.S. Justice Department. On December 18th, security blogger Brian Krebs broke the story in this post: "Nationwide retail giant Target is investigating a data breach potentially involving millions of customer credit and debit card records," mentioned Krebs. "The sources said the breach appears to have begun on or around Black Friday 2013 -- by far the busiest shopping day the year." (Vijayan, 2014)…

    • 256 Words
    • 1 Page
    Satisfactory Essays