Sunday, July 20, 2014

Unit 5 Blog - Target: A Security Breach Nightmare

Unit 5 Blog - Target: A Security Breach Nightmare

By

Lauren Camper
Benjamin Crump
Ryan Goodman

            A security breach is something that we all try not to think about. We put sensitive information in our cell phones and hope that nobody can hack into them and steal the information. We purchase items online with our credit cards while hoping that our personal information is safe. Everybody knows that there is a risk involved when using personal information on any internet-connected device. The same does not hold true, however, for brick and mortar purchases. Over the last several years, it has been a rare occasion that I have thought about the possibility of having my personal information stolen subsequent to a purchase at a brick and mortar store such as Target. Even if it does become something that we think about on a regular basis, there really is nothing that can be done, as a consumer, to prevent such risk except to pay for everything with cash. As cash seems to be a dying part of the past, a sudden resurgence in cash purchases seems unlikely. The reality that we face now is that our information is always at risk, we just need to be prepared in case our information is stolen. If you shopped at target in December of 2013, then your credit card information might have been stolen by hackers who gained entry into Target's information systems. According to Target's own website, up to 70 million individuals' personal information may have been stolen ("Payment Card Issue FAQ", n.d.).

            In early December 2013, hackers somehow managed to install a form of malware in Target's network. Unfortunately, this opened a hole that the hackers were able to exploit so that they could steal private customer information ranging from credit card information to addresses and other personal information ("Payment Card Issue FAQ", n.d.). According to an article in Businessweek, the Department of Justice informed Target about the breach in mid December (Riley, 2014). Target immediately began work to seal the breach and determine the extent of the damage. They had just installed a new malware detection software called FireEye a short time before the breach occurred. Apparently, the system raised alarms, but they fell on deaf ears; these alerts were missed by Target's information security team (Riley, 2014). The result of the breach was a 46% drop in 4th quarter profits year-over-year (Krebson Security, 2014). Consumer confidence took a nosedive specifically relating to Target. Within 6 months of the breach, both the CIO and the CEO were ousted. This video on Bloomberg highlights the fallout from the Target data breach Video - Target Data Breach Fallout.

            When evaluating the issues involved with the Target data breach, it is helpful to look at McCumber's Cube Framework, as shown below.

Source: http://en.wikipedia.org/wiki/McCumber_cube

            The cube gives us a theoretical framework from which to evaluate Target's data breach in terms of what went wrong and how to potentially correct it in the future. It is apparent that Target didn’t have policies or practices in place to monitor alerts from their brand new FireEye Malware protection program. Target didn’t have enough awareness, education, and training as it pertained to their executives and senior management regarding cyber security. In terms of what they did correctly, Target appropriately used and invested in the technology necessary to detect the attacks, FireEye. As for the critical characteristics of the data that was stolen, McCumber would classify the Target breach as an issue of confidentiality. Target was not able to keep the data confidential despite the trust that consumers placed in them. This framework highlights the need for Target to institute specific monitoring policies and practices regarding the FireEye Malware protection program as well as the need for intense training, education and awareness as it relates to all members of the company, especially senior management.

            Cyber-security is everyone’s issue. All levels of senior management should be concerned with cyber-security. Target’s CIO and CEO are both no longer with Target as a direct result of the data breach. According to an article by CNBC, a study done by a cyber-security firm indicates that only 45% of senior management acknowledged that they are responsible for protecting against cyber-attacks (Schlesinger, 2014). This is clearly an unacceptable statistic. As senior managers (executives), everything that happens to the firm or as a result of the firm's actions is their responsibility. It is unfortunately that the majority of senior managers do not feel this way. This points back to McCumber's cube framework and the need for education, awareness, and training, especially at the senior management level.

            Target has been attempting to do all they can in order to regain the confidence of the general public. Unfortunately, as with any breach in trust, this will take time. I am still hesitant to shop at Target because of this, even though that might not be a rational fear. As time moves on, Target will need to find ways to assure the public that their personal information is safe. They have begun to take steps towards that goal by putting a rush on their chip-enabled technology rollout to their stores ("Payment Card Issue FAQ", n.d.). This may or may not help protect customer information in the future, but it certainly helps to foster the public perception that personal data is being held safely and confidentially. Perhaps actual protection is not as important as the perception of protection, as is the case with the safety of our country. We are never truly safe from terrorist attacks, just as we are never truly safe from attacks on our information. As consumers, and as business managers, we need to take all possible steps in order to minimize the impact should a breach of information occur. Preparation could save us all a lot of time and money.

Sources:

Krebson Security. (2014, May 14). Krebs on Security RSS. Retrieved July 19, 2014, from             http://krebsonsecurity.com/2014/05/the-target-breach-by-the-numbers/

Payment Card Issue FAQ. (n.d.). payment card issue FAQ. Retrieved July 19, 2014, from             https://corporate.target.com/about/shopping-experience/payment-card-issue-FAQ#q5888

Riley, M., Elgin, B., Lawrence, D., & Matlack, C. (2014, March 13). Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It. Bloomberg Business Week. Retrieved July 19, 2014, from http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data

Schlesinger, J. (2014, May 11). Painful lessons from Target's massive data breach.CNBC.com.      Retrieved July 19, 2014, from http://www.cnbc.com/id/101650707#

Target's Data Breach: What Went Wrong?: Video. (2014, June 3). Bloomberg.com. Retrieved July 19, 2014, from http://www.bloomberg.com/video/target-s-data-breach-what-went-wrong-lRqQ2owdQsal8Wok1eYbpw.html


Monday, July 14, 2014

Unit 4- Transnational IT Business Strategies


 
 
 By
Lauren Camper
Benjamin Crump
Ryan Goodman
Transnational organizations are businesses that operate in multiple countries. Their business strategies, from an IT perspective, are unique in that they combine global configuration with local responsiveness (Linton, 2014). Centralized information systems are vital components of the transnational strategy (Linton, 2014). “Transnational IT operations enable an organization to deliver consistent information services to all locations and support high levels of collaboration, while allowing individual locations the flexibility to adapt to their local market conditions (Linton, 2014).” With any IT business strategy, there are pros and cons associated with its implementation. This blog post will detail the pluses and minuses of IT business strategies with transnational organizations as well as examine a real world case in which IKEA successfully implemented their transnational IT business strategies.

Transnational IT business strategies can come in several forms including global e-commerce, global supply chain and business continuity (to name a few) (Linton, 2014). Some of the informational technologies that enable businesses to succeed globally are web based applications, internet and extranet connectivity, and the ability to communicate in the local market place (Basu, 2014). Management of the implementation of the IT business strategies is important to ensure that the business goals are in line with the strategic IT goals.

There are many advantages to transnational IT business strategies such as:

-        They provide flexible operations in terms of business hours, service language and market reach. By operating in multiple time zones, business are able to provide customer service around the clock. Additionally, they are able to tailor their websites or business information to the local language or enable customers to select the language they would prefer. Lastly transnational companies are able to reach various markets by having a global presence (Marulanda, 2010).

-        There is potential for lower cost structures, being that the business operates in another nation that may have access to resources more affordably (Marulanda, 2010).

-        Business continuity is heightened. If a disaster were to occur in one location, the local company can recover its data from back-ups at other centers via the global network (Marulanda, 2010).

-        Collaboration is simplified which enables companies to “draw on expertise around the world (Marulanda, 2010).”

-        Supply chain management via transnational IT strategies enables businesses to connect with vendors and suppliers across secure networks. It enables businesses to tap into global networked resources; particularly in the time of a supply chain crisis (Marulanda, 2010). 

Adversely, if poorly managed, transnational IT strategies can negatively impact a business in the following ways:

-        Not every country has access to technological infrastructures which can severely impact a company (Marulanda, 2010).

-        Slow communication connections can be damaging to a business in terms of response times (Marulanda, 2010).

-        Unstable political environments can impact an organizations ability to conduct business or implement the technological strategies they wish to implement (Marulanda, 2010).

-        The technical capabilities of local employees may not be to the standard that the organization is accustomed, which can impact the ability to implement the appropriate technological needs (Marulanda, 2010).


IKEA is one of several successful transnational organizations that has implemented a successful IT business strategy. This Swedish based company is the largest furniture retailer in the world (Lu, 2014). Founded in 1943, the company is known for its easy to assemble furniture; sold at affordable prices (Lu, 2014). IKEA has over 9,500 products per store and operates in 37 countries (Lu, 2014). One of the many reasons this business is so successful is because of its supply chain strategy. IKEA stores mirror a warehouse layout. Each store has a logistics manager who is responsible for inventory replenishment. The replenishment system is based off of systemic calculations of consumer demand (Lu, 2014). They use a “minimum/maximum settings” system, developed by IKEA, to appropriately address inventory levels on a daily basis (Lu 2014). The company also uses automatic retrieval and storage systems which drive down their cost-per-touch (the number of times a customer touches a product- more touches equals more costs associated with the product) (Lu, 2014). In addition, IKEA has a robust online ordering system that is multifunctional for both customers and suppliers. The internet based site is segregated by country and displays various products, descriptions, and product availability. They also have a separate supplier’s link that enables suppliers to connect with the organization. Lastly, IKEA is widely known for its massive catalog that is produced annually. Ikea believes the shopping experience starts and ends at home, therefore they have created an interactive function for consumers to begin their shopping experience at home; not only from their computers but from their mobile devices. In 2013 IKEA created an interactive catalog which allows customers to use their mobile devices to scan catalog products and virtually place them in their homes to see how products will look in their personal spaces. This application enables customers to visualize furniture before purchasing it. Check out the video below for a first look at the interactive catalog.

 

 

Transnational IT business strategies are an important component for businesses. If managed and implemented correctly, they have the potential to heighten communication for customers, increase infrastructure, increase supply chain management and enhance flexibility. Mismanagement of these strategies can have the adverse effect on the organization. IKEA is one of several transnational organizations that has been able to sustain its global position because of it’s successfully supply chain management across the world, e-commerce efforts, and mobile application enhancements. Businesses should strongly consider doing their research before implementing a new IT business strategy for their transnational organization to optimize its potential for success.

 
Sources


Linton, Ian (2014). Transnational IT Operations as a Strategy. Retrieved from http://yourbusiness.azcentral.com/transnational-operations-strategy-4238.html
 
Basu, Chirantan (2014). What is a Transnational Business Strategy? Retrieved from http://smallbusiness.chron.com/transnational-business-strategy-20950.html
 
Marulanda, Jaime (2010). Transnational Operations. Retrieved from http://www.thecompanyofthefuture.com/post/Transnational-Operations.aspx

Lu, Clara (2014). Ikea’s Inventory Management Strategy:  How does Ikea do it? Retrieved from http://blog.tradegecko.com/ikeas-inventory-management-strategy-ikea/