preview

Tjx Failure Essay

Decent Essays

1. Identify & describe the failure points in TJX's security that requires attention (including, but not limited to: People, Work Process, and Technology)? After analyzing the Ivey case on TJX data fiasco, I would say there were three major failure points that caused this $168MM financial hit to the corporation.
• Technology: it is obvious that TJX had several technology deficiencies mainly driven by systems limitations and vulnerability. For example, inadequate wireless network security allowed the hackers to attack specific stores just by using a laptop and an antenna which permitted the thieves access to the central database. As it was mentioned in the business case, TJX was using (WEP) as the security protocol and it is …show more content…

• Customer’s sensitive data: TJX needs to identify and control where customer sensitive data is being store, for example TJX was storing this type of information on local machines without any type of regulation.
3. What should its short-term priorities and long-term plans be?
Short term priorities:
• Implement a security training program for IT employees and any employee manipulating customer sensitive data
• Identify the weak system areas that intruders may attack
• Establish periodically auditing check up points.
• Complete financial analysis on the $ cost / benefit investment needed to upgrade technology security. Technology is expensive; however, data breaches are even more expensive.
Long term priorities:
• The CIO role in the company needs to be clearly identified along with accountabilities and objectives for him and his organization, including preventing security breaches.
• Since E-Commerce and technology evolves every day, developing a team or process to stay on top of potential business risks associated to security.

4. Was TJX a victim of ingenious cyber crooks or did it create risk by cutting corners?
TJX created its own risk because it had so many deficiencies in its data security processes and it lack of good quality wireless security. The best proof that TJX created its own risk is the fact that

Get Access