How secure is your organization’s computer network? Presumably, not as strong as a multi-billion dollar company. But considering the security breaches these large corporations endure on a regular basis, that should make you pause to consider the status of your own IT security. Case in point: TJX Companies.
In 2006, TJX Companies—a large retailer that operates over 2,000 stores under such brands as Marshalls, T.J. Maxx, HomeGoods and A.J. Wright—suffered one of the worst ever data breaches when 45.6 million credit and debit card numbers were stolen from one of its servers over a period of more than 18 months by unknown cyber assailants. Prior to this incident, the largest breach at CardSystems Solutions had resulted in 40 million records being compromised.
The breach of TJX Companies’ computer systems had far-reaching financial consequences in addition to the estimated $5 million the company had spent in connection with the attack. Several major banks and credit unions around the country and in other affected regions (Canada, Puerto Rico, and even as far as Ireland and the U.K.) had to block and reissue thousands of payments cards as a result of the breach, resulting in millions of dollars in direct and indirect costs.
Since the attack, TJX Companies has significantly strengthened the security of its computer network. The computer security experts hired by TJX Companies confirmed that the containment plan implemented by TJX was appropriate to prevent future intrusions.
The world of cyber security is extremely fluid, as cyber attackers are constantly thinking of new ways to bypass the latest security measures set in place by the leading IT experts in the field. To see where your computer network stacks up in this ongoing cyber war, contact Nextrio, Tucson’s trusted IT company for business. Our experts will assess your IT needs and make detailed and actionable recommendations to increase your security, productivity, and efficiency.
Call Nextrio at (520) 519-6301 to learn more about the services our IT professionals provide, including migration to the cloud, strategic IT planning, and the day-to-day management of your technology.
This article is part of our collection of WORLD FAMOUS SECURITY BREACHES!