Critical Lessons Learned from Last Year’s Target Data Breach

In March, the United State Senate Committee on Commerce, Science, and Transportation issued an analysis of last year’s massive data breach by Target, which affected upwards of 100 million customers, cut the company’s Q4 2013 profits by 50%, and resulted in the ousting of both its CIO and CEO.

The main finding of the analysis shocked some technology insiders, though: the key source of the breach came when Target granted network access for electronic billing, contract submission, and project management to a third-party vendor: Fazio Mechanical Services, a medium-sized HVAC company based in Pennsylvania that, like many companies, suffered last year from an email-based malware attack.

This allowed cyberattackers to access Target’s internal network; install malware on a majority of the company’s in-store point-of-sale (POS) systems; collect unencrypted credit and debit card information before it was transferred to a payment processing provider; compromise other servers and firewalls so the stolen data could be moved through them and dumped on external FTP sites; and then sell the critical data via online black market forums called “card shops.”

Of course, the HVAC company in question wasn’t entirely to blame. Target failed to respond to numerous automated warnings from its FireEye anti-intrusion software—and didn’t allow it to automatically delete the malware as the software is designed to do.

How Does This Affect Your Business and Its IT Environment? In Two Ways:

1) Recognize the threat of malware. If Fazio Mechanical Services hadn’t fallen prey to an email-based malware attack, the Target data breach may have never occurred. According to a threat report by security firm Check Point, in 2013, a new and unknown malware attack originated every 27 minutes. The leading email attachment file format used to infect computers was PDFs, which accounted for 35% of all infected file types. The bottom line? Do NOT click on any email attachments or embedded links unless you trust the sender or source and are expecting said attachment.

2) Give your systems the proactive security blanket they deserve. Here’s a direct quote from a 2011 Lockheed Martin Computer Incident Response Team white paper cited by the U.S. Senate analysis of Target’s data breach: “Instead of installing static defense tools and waiting for the next attack, network defenders should continuously monitor their systems for evidence that attackers are trying to gain access to their systems.”

Luckily, implementing this kind of prevention lies directly within your control. At CMIT Solutions, we specialize in proactive monitoring and management, security best practices, top-flight data encryption, backup and disaster recovery, business continuity, email archiving, and a host of other services crucial to surviving (and thriving) in today’s complicated IT world.

Want to avoid email-based malware, protect your data from system intrusion, and NOT be responsible for a large corporate client’s widely publicized breach? Contact CMIT Solutions today so we can keep your business up and running, productive, and as secure as possible.

Back to Blog


Related Posts

15 Quick Keyboard Shortcuts to Supercharge Your Use of Microsoft Office

In late 2013 and early 2014, CMIT Solutions covered 10 tricks, tips,…

Read More

Personal Data at Risk if You Don’t Wipe Your Old Mobile Device

Over the last 12 months, the four largest mobile carriers in the…

Read More

Who Can You Trust with Your Information? Recent Poll Says Not Many Institutions

No technology trend has been more ubiquitous lately than online security (or…

Read More