Every shadow has a bright side

I slam my fingers on bits of plastic to create stuff no one can hold

14 March 2014

Interesting Step By Step Details Of The

by Code Monkey

Adam
Plattner{.author-photo}Adam Plattner{.author} - 2014-03-14 14:19:17-0400[

Interesting step by step details of the breach and follow up.

Originally shared by Les Jenkins{.reshare-attribution}I was already inclined to not shop at Target again after the massive data breach they had this past holiday season purely based on how long their systems were compromised, but this Bloomberg Businessweek article says that Target had a sophisticated malware detection system in place that spotted the hack nearly as soon as it began and no one did a goddamned thing about it.\ \ That’s just irresponsible. They essentially ignored the very system they put in place to prevent such a hack from happening and they ignored it for months. Having such a system in place would be a good reason to shop at Target simply because they’re one of the few retailers with such a system, but if the people running it are incompetent then there’s little point in spending the money and even less point in shopping at one of their stores ever again.{.link-embed}

http://www.businessweek.com/authors/1839-michael-riley

Shared with: Public

tags: