The Protection Of Valuable Intellectual Property And Business Information

960 Words4 Pages
When it comes to fundamental challenges that organizations face in general in regard to protecting organizational assets and information it becomes overlooked. Eliminating threats is impossible, so protecting against them without disrupting business innovation and growth is a top management issue. Cybersecurity the protection of valuable intellectual property and business information in digital form against theft and misuse, one of the most serious economic and national security challenges we face as a nation (Michael Riley). Being prepared to protect assets and information is a much difficult task for businesses. Target, for example had a challenge in the past with the hacking of someone installing malware in Target’s (TGT) security and…show more content…
The red flags that target have overlooked during the attack the hackers uploaded exhilaration malware to move the stolen credit cards around the stores, however fire eye had spotted them. Target found FireEye’s alerts from Nov. 30 and more from Dec. 2, when hackers installed yet another version of the malware. It was stated that Banglaore got the alert and flagged the security team in Minneapolis, but nothing happened (Michael Riley). Those alarms were impossible to miss due to the two previous uploads of the malware. The security should have responded as the hackers never started transmitting the stolen card data out of target’s network (Michael Riley). Target being a retail store primarily focuses on selling stuff to make a profit not security. It is believed in my opinion that Target had overestimated hackers.
The breach occurring and others not responding, it is my belief that it could make one believe that certain personnel was actually a part of the breach. This statement could be defended, by ones accusations of personal feelings toward the company. For example, an individual may have wanted a promotion and/or have gotten fired that was familiar with the company’s security operation system. However, in a sense after the breach that’s when certain precautions had to be taken.
Those main actions that Target took after the breach occurred were to interview 10 former target employees
Get Access