They used these details to create their own accounts and were also able to access TJX systems from any computer on the internet. Moreover, the thieves made full use of the technology. This site uses cookies. Business Unit Level Solution – The case study may put you in a position of a marketing manager of a small brand. Not only auditing, but we also cover more than subjects and our writers deal with all types of assignments with utmost expertise. Save Time This personalized library allows you to get faster access to the necessary documents.

The action plan for the immediate future must be to contain the security breach and implement steps to fix the vulnerabilities. They had over stores and about , associates. Retrieved February 2, , from http: Business case study paragraph by paragraph mapping will help you in organizing the information correctly and provide a clear guide to go back to the case study if you need further information. You should try to understand not only the organization but also the industry which the business operates in. This is an academic, researched and referenced do

Conditions Operational efficiency, vendor relationships and scale, which are crucial to an off-price store, are well maintained in TJX.

security breach at tjx case study solution

Build a corporate level strategy – organizing your findings and recommendations in a way to answer the larger strategic objective of the firm. TJX was hit by hackers back in December They used these details to create their own accounts and were also able to access TJX systems from any computer on the internet.

TJX should also look at having independent IT security audits on a quarterly basis.

Security Breach at TJX by Jahmoy Morgan on Prezi

So instead of providing recommendations for overall company you need to specify the studg objectives of that particular brand. Secuirty Breach at TJX. At an organizational level, TJX should create formal procedures for risk management and use a RACI Responsible, Accountable, Consulted and Informed matrix to assign key responsibilities such as network security scans and upgrades, internal PCI audits, firewall scans and ensure that these activities are carried out as planned.


Logs are very important to track any previous transactions and TJX has not taken care to monitor them properly. These logs usually provide information about files on the system, when they had been added, changed, accessed, the format of contents and so on. TJX must make necessary investments required for upgrading the system. TJX also effectively implemented barcode scanners and kiosks to speed up business operations. It is the overruns and canceled orders due to unpredictability of the market, and the inability of designers and full-price retail stores to perfectly predict consumer demand, that create excess inventories for off-price consumption.

Their auditors failed to identify three key problems with TJX systems i. Explain about the Advertising for An integrated marketing communication perspective? Amazing Business Data Maps.

Security Breach at TJX [10 Steps] Case Study Analysis & Solution

TJX should look at implementing a three-tier architecture where the database layer is completely separated securiy the application layer to which the kiosks have access. Threat of new entrants The high growth rate of the off-price retail industry may seem to attract new entrants, however in order to successfully operate in the off-price retail industry, a company requires a huge capital investment for bulk purchases of large amounts of inventory from its vendors, good vendor relationships to ensure that the vendors sell their excess goods at a price that is profitable for the off-price retailer, a strong distribution network and geographic reach with its customers and IT systems that facilitate these connections throughout the supply chain.

TJX should log all the transactions happening in their stores and save them into their databases with proper stuudy. Also, TJX had stated in its public statement that the hackers had access to the decryption tool for the encryption software used by TJX. Maxx, Marshalls, Homegoods, A.

security breach at tjx case study solution

They had over stores and aboutassociates. Because of poor wireless network security, it was easy for the thieves to exploit the networking system. They must be located near security cameras or store registers to ensure constant vigilance. TJX has retained customer data years after it should ssecurity been purged.


This is an academic, researched and referenced do Solhtion systems help TJX connect people, places and information in the value chain. Once you have developed multipronged securityy and work out various suggestions based on the strategic tools. Threat of Substitute Products Since TJX does not have a brand value of its own, but relies on other branded products, there is a high threat of substitute products, in terms of clearance or outlet sales by the branded department stores themselves, which also offer huge discounts and attract the brand and price-conscious consumers that TJX targets.


Wireless is one of the most popular means to hack data from retail chains. You should make a ssecurity of factors that have significant impact on the organization and factors that drive growth in the industry.

However, on investigation, it was found that there were three major issues in the system of TJX. Cause of technology Failures and computer intrusions. This involves faults in the audit system as well. After refreshing your mind, read your case study solution critically. When the intrusion was confirmed, TJX planned to maintain confidentiality and maintain the data of customers instead of disclosing the intrusion tjc such an action may impede the criminal investigation sokution was going on.

If you able to provide a detailed implementation framework then you have successfully achieved the following objectives – Detailed understanding of the case, Clarity of HBR case study fundamentals, Analyzed case details brech on those fundamentals and Developed an ability to prioritize recommendations based on probability of their successful implementation.