The designed to protect their network. We don’t

The impact of Target Data Breach that compromised the personal data of millions individuals has left many confused, frustrated and downright angry. And while massive attacks on large corporation make headlines, some businesses have just as much, if not more at stake. According to Gregg Steinhafel , the former Chairman and CEO of Target in a letter sent to customers “As you may have heard or read, Target learned in mid-December that criminals forced their way into our system and took guest information, including debit and credit card data. Late… we learned that additional information including name, mailing address, phone number or email address was also taken” ( Steinhafel, nd). Cyberattacks are likely to have a bigger financial impact on businesses. Less advanced security protection, a small budget dedicated to cybersecurity and fewer resources for a fleshed out IT department make some businesses an ideal target for hackers.                          What exactly happened to target Data Breach?One point of attack is the POS system. The software used to hack the POS system is variant on the and is commercially available on cybercrime forum. According to Rosenblum “For a robust sum of $1,800 for the “budget version” and $2,300 for the “full version”, which allows the bad guys to encrypt the data they’ve stolen” (Rosenblum, nd). but the question remain how did they even gain access to target’network servers looking for valuable information? But we all know that Firewalls are very are very crucial in securing network systems. These software will warm you if you’re being directed to a malicious Web Site. Large organizations have both hardware and software firewalls designed to protect their network. We don’t know if Target had a reliable security system to protect their assets and their customers . Hardware and software firewalls essentially seal up all ways in and out of your network except the route used for internet. Businesses like Target should create cybersecurity plan that include employees training program on security policies and procedure, strong payment processors’ protection, secure WI-FI used of firewalls and Anti-Virus software…