You are on page 1of 1
Boss | Think : Do you think that the strategy followed after the security breach was effective ? About Case: Brett Flayton, CEO of Flayton Electronics, has got to know about a data breach. Flayton Electronics was a regional chain with 32 stores in 6 states. The sensitive credit card details must be stored and processed securely by merchants. Flayton Electronics comes up with a strategy on how to help customers with their identity theft while waiting for the secret service to determine what exactly happened. The strategy followed 1. Securing a computer network by means of logical controls is a difficult but necessary requirement for ensuring the safety of a computer system from attacks by outsiders or hackers. 2. Flayton had actualized a PCI framework; nonetheless, the framework was just running at 75% when it ought to have been at 100%. 3. Banks just monitor situation until specific problems arise. This could be done internally. 4, Jay Foley’s recommendation is the most appropriate for this situation and would produce the best outcome for Flayton Electronics 5. Flayton Electronics still does not have a great deal of information about the data breach, Foley insists that the company should remain quiet for the time being. 6. Taking this information public would be directly interfering with a Secret Service investigation 7. Should re-evaluate internal policies & procedures, establish regular self- audits & strategic planning assessment. That is why | support Jay Foley’s recommendations that the company should reduce risk by closing transaction loopholes and re-evaluate its internal assessment procedures

You might also like