Growing computer connections between vendors and businesses give hackers many points of entry

  • Article by: JENNIFER BJORHUS and Jim Spencer , Star Tribune
  • Updated: February 11, 2014 - 3:47 PM

Tar­get, oth­er firms need strong­er protections to pre­vent data thefts.

  • 3
  • Comments

  • Results per page:
  • 1 - 3 of 3
joe_mnFeb. 11, 14 7:39 AM

the vendors security systems are lacking. sez the security system analysts. here is my bill for the analysis of your security system.

1
1
csjohn1Feb. 11, 1410:45 AM

The old "Look, there a water buffalo" defense. Simple fact is Target did not keep their eye on the ball. Let's not get diverted from who is responsible for securing customer data, and who was irresponsible. I will shop at Target when they have installed smart cards without magnetic strips

1
2
mouthwashFeb. 13, 14 3:58 PM

Chief Operating Officers, who generally play a false, passive role as "vice-CEO" yet make almost as much as CEO's simply for sitting in their office eating caviar and orating reports from the accounting department during business meetings, have to step up to the plate and do their job. For one thing, there is no reason that "specialized, controlled data pipelines" can't be utilized which only allow access from certain locations to begin with. If that vendor's data had been on an EXCLUSIVE terminal data pipeline with Target there would not have been the opportunity for phishing to begin with.

0
0
  • 1 - 3 of 3

Comment on this story   |  

ADVERTISEMENT

Connect with twitterConnect with facebookConnect with Google+Connect with PinterestConnect with PinterestConnect with RssfeedConnect with email newsletters

ADVERTISEMENT

ADVERTISEMENT

ADVERTISEMENT

ADVERTISEMENT

ADVERTISEMENT

ADVERTISEMENT