Preview

TJX the largest-ever consumer data breach

Better Essays
Open Document
Open Document
1054 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
TJX the largest-ever consumer data breach
TJX- SECURITY BREACH MGSC 6201-02
INDUSTRY/COMPANY CONTEXT:
TJX Companies, based in Framingham, MA, was a major participant in the discount fashion and retail industry. The TJX brand had presence in the United States as well as in Canada and Europe. In mid-2005, investigators were made aware of serious security breaches experienced in TJX’s credit card system. These breaches were first found at a Marshall’s located in St Paul, MN in which the hackers implemented a “war driving” tactic to steal customer credit card information. This incident resulted in over 46 million debt and credit card numbers being compromised and is considered to be the largest security breach in US history. The security breach at TJX resulted in major members of the credit card association to establish the Payment Credit Industry Data Security Standard (PCI DSS) in order to better regulate security needs for merchants’ company credit card systems.
Further investigation revealed that these breaches at TJX could be traced back to 2003. Some key factors driving this situation included the following:
TJX’s lack of cybersecurity sophistication (i.e. use of WEP, severs always in administrator mode, etc.)
Overall lack of awareness by the consumer in terms of steps taken to mitigate breach risks
Unpredictable and inconsistent standards set by PCI DSS
CASE FACTS AND ANALYSIS
The key challenges TJX faced was implementing cybersecurity into their overall business model and emphasizing its importance on a corporate level. This required management and IT to align their security strategies (under the rules and regulations of PCI DSS) and take a “business back” approach, putting the focus on important business asset. More specifically, various issues involving both TJX and the other players in the credit card payment network include:
TECHNOLOGICAL UPGRADES/SOPHISTICATION: TJX found themselves using the Wired Equivalent Privacy (WEP) security protocol for protection, whereas newer and more



References: Walker, Russell. “Maxxed Out: TJX Companies and the Largest-Ever Consumer Data Breach.” Kellogg Case Publishing, 2013. Kaplan, James, Sharma, Shantnu, and Weinberg, Allen. “Meeting the cybersecurity challenge.” McKinsey Quarterly, 2011.

You May Also Find These Documents Helpful

  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    And did not properly install another layer of security software it had already purchased .TJX also retained card hold data in its system much longer then stipulated by industry rules for storing such data. This company had very little security controls in place at all. The weakness of having a system that TJX had in place are a hacker can gain unauthorized access by finding weakness in the security protections employed by Web sites and computer systems, often taking advantage of various features of the Internet that make open system that is easy to use another problem is a hacker can install a sniffer which is eavesdropping program that monitors information over the internet so they can find personal information haw they want to.…

    • 667 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Tjx It Security Breach

    • 1174 Words
    • 5 Pages

    In January of 2007 the parent company of TJMaxx and Marshalls known as TJX reported an IT security breach. The intrusion involved the portion of its network that handles credit card, debit card, check, and merchandise return functions. Facts slowly began to emerge that roughly 94 million customers’ credit card numbers were stolen from TJMaxx and Marshalls throughout 2006. It was believed that hackers sat in the parking lots and infiltrated TJX using their wireless network.…

    • 1174 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    It205 Week 5 Checkpoint

    • 272 Words
    • 2 Pages

    The banks have been affected the most by the stolen data more so than the retailers, the credit card companies or TJX, and may have to pay up to $300 million to recover stolen credit cards in addition to covering fraudulent purchases. TJX is being sued for not protecting their customers’ information and estimates losses at $1 billion over 5 years. The customers have lost trust in TJX and those polled said they would never again shop at the effected retail stores.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    References: Cereola, S. J., & Cereola, R.J. (2011). Breach of Data at TJX: An Instructional Case Used to Study COSO and COBIT with a Focus on Computer Controls, Data Security, and Privacy Legislation. American Accounting Association, 26 (3). Retrieved from ProQuest Business database on October 5th, 2011.…

    • 1608 Words
    • 7 Pages
    Better Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The credit card data theft at TJX Companies is considered one of the worst ever. The case is significant because of a lack of appropriate security and control.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Security Breach at Tjx

    • 288 Words
    • 2 Pages

    Assignment 3 requires you to critically review the assigned case study and write a report…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Background: Flayton Electronics, a second generation family business, has just been notified that there may have been a data breech associated with credit cards used at their stores. The initial reports indicates at least 1500 accounts may have been compromised although this number appears to be growing quickly as more banks and clearing houses are notified of the possible breech. Flayton is a small, regional electronics business with 32 stores in six (6) states. The case study is happening within 24 hours of first notification of the possible breech.…

    • 2381 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    UNFO traditionally has been a brick-and-mortar retailer, and the management has experiences of associated business risks such as employee theft and shoplifting. However, as the organization moves into the e-commerce model, new risks will be introduced to the organization. As the information security analyst, it will be your role to summarize the business impact of these new risks, the motivating factors that one may have to exploit vulnerabilities, and how the risks can be mitigated.…

    • 258 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Macy’s sympathizes with the customers for the harm that was caused due to the data breach, and the company wants to reassure that Macy’s is a reliable company in which customers can trust because Macy’s will always be there for them.…

    • 126 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    As seen in the video, criminals stealing hard drives from commercial establishments is becoming more common and holds the opportunity for criminals to steal hundreds of individuals’ credit and debit card information. This growing trend puts the consumer at risk for extra charges on their credit and debit cards as well as identify theft. What is even more surprising is that consumers are unaware of the true risks that are involved in using their card at terminals in stores. Moreover, even though businesses are to swipe the hard drives clean each day, many are failing to complete this proper procedure to prevent consumer’s stolen information. To add, where the consumer’s information was compromised is not made available to the consumer.…

    • 666 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Data Breach Research Paper

    • 1510 Words
    • 7 Pages

    When data breaches occur, it can be extremely costly towards a company. They may be required to pay fees directly to consumers, or pay for technology that increases their security so a hack does not occur again. Either way, corporations should understand the cost that a hack of consumers’ information could cost them. Ponemon Institute researched this and found, “data breaches cost companies an average of $221 per compromised record – of which $145 pertains to indirect costs, which include abnormal turnover or churn of customers and $76 represents the direct costs incurred to resolve the data breach, such as investments in technologies or legal fees” (2016 Cost of). Corporations should invest more into security systems…

    • 1510 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Tjx Case Study

    • 9608 Words
    • 39 Pages

    TJX Companies Inc. is a leading off-price apparel and home fashions retailer with headquarters situated in the United States. In late 2006, the company discovered it was victim to a massive security breach which compromised millions of customer records. Despite the internal exchanges within the IT department concerning the upgrade of their wireless security standard protocol, the company opted for cost savings rather than increased spending. As the company financials took a hit, the company was faced with pending lawsuits from credit card companies and affected customers; government scrutiny of IT security standards; loss of consumer confidence; among other concerns. Though it has not yet concluded the extent of the financial impact of this incident, analysts estimate the full cost of the breach might amount up to one billion dollars. This case presents a “wake-up call” for retail companies about the importance of IT security.…

    • 9608 Words
    • 39 Pages
    Good Essays
  • Good Essays

    Security Breach Examples

    • 321 Words
    • 2 Pages

    Nowadays, security breaches are prevalent in our environment, both physical and logical. Different types of unauthorized access are conducted by different groups of individuals for different purposes.…

    • 321 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Instead, reporting attempts were limited to a small sample of representative companies, of which, few responded. The standard practice in the security community is to publicly release information when the vendor(s) is nonresponsive. However, the vulnerabilities disclosed in this document denote a set of fundamental flaws in the pointof-sale process. Even if a solution were available today, it would take years to be fully deployed. Given that a full disclosure of these vulnerabilities would unlikely lead to a rapid deployment and adoption of more secure systems, this public disclosure was delayed. It was hoped that the credit card industry would respond and address some of the more significant issues. Although a few of the issues appear to have been addressed (see Section 10: Addendum), there has not been any direct response or acknowledgement from the major credit card providers and processors. It is important to recognize that nothing in this paper is new or novel. In most cases, these risks have been known to the credit card industry for more than a decade, however little has been done to address these risks. In this paper,…

    • 4017 Words
    • 17 Pages
    Better Essays
  • Powerful Essays

    In conclusion, the major issues within the company is lack of communication according to how Flayton Electronics were affected throughout the process of the breach.…

    • 2421 Words
    • 10 Pages
    Powerful Essays