Sunday, September 22, 2019
The TJX company Essay Example for Free
The TJX company Essay The company used Wired Equivalent Privacy encryption system to handle their clientââ¬â¢s credit and debit card information. This system was very easy for any hacker to gain access to peopleââ¬â¢s information. It was completely out of date and did not encrypt anything within the company, which made it more vulnerable. They did not install firewall security correctly. TJX had purchased many other security programs that were not properly installed. They kept customerââ¬â¢s information in their system longer than what is required by law. TJX could have switched to WiFi Protected Access (WPA) to encrypt their clientââ¬â¢s personal data information, but failed to do so. This system is much more sophisticated that the previous system and it encrypted everyoneââ¬â¢s information, because it was more complex. Firewalls should have been installed correctly because it could have been prevented and would have saved the company the embarrassment of knowing that their system was not safe. This data should have been protected when transferring information over a wireless connection. The business effect of TJXââ¬â¢s data loss will cost them significantly. Because of their incompetence of not installing the proper software needed to ensure customerââ¬â¢s information, this will cost them $202 million to deal with the theft and the lawsuits brought on. They agreed to strengthen their system security and agreed to have third-party auditors to check their security features every 2 years, for the next 20 years. There was research conducted by a company called Forrester Research, which estimated that their business would cost them $1 billion for the next five years. This finding was based on the cost of additional marketing, security upgrades, consultants, and attorney fees. The moral dimension that may be applied is the fact that they need to ensure that the customerââ¬â¢s information is secure and encrypted. The next thing for the company is to take full responsibility for the data loss when they could have taken the simple measures of doing so.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.