{"id":1734,"date":"2016-12-19T13:09:08","date_gmt":"2016-12-19T21:09:08","guid":{"rendered":"http:\/\/webcentsmagazine.com\/?p=1734"},"modified":"2018-12-19T13:10:36","modified_gmt":"2018-12-19T21:10:36","slug":"5-lessons-every-business-can-learn-from-the-target-breach-2","status":"publish","type":"post","link":"https:\/\/webcentsmagazine.com\/?p=1734","title":{"rendered":"5 Lessons Every Business Can Learn From The Target Breach"},"content":{"rendered":"5 Lessons Every Business Can Learn From The Target Breach\n\nMarch 2014 Integrated Solutions For Retailers\n\nBy Jim Maloney, chief information security officer, Mercury Payment Systems\n\nWith credit card data security such a hot topic these days, now is a good time to make sure your systems are protected.\n\n\n\nFor retailers, there are few things more threatening than a security breach. Knowing that la<div class=\"leaky_paywall_message_wrap\"><div id=\"leaky_paywall_message\"><a href=\"https:\/\/webcentsmagazine.com\/?page_id=1968\" style=\"text-decoration:underline; color:#e92a29; font-weight:bold;\">Subscribe or log in<\/a> to read the rest of this article. Subscription includes access to the website and <strong> all articles<\/strong>.<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>5 Lessons Every Business Can Learn From The Target Breach March 2014 Integrated Solutions For Retailers By Jim Maloney, chief information security officer, Mercury Payment Systems With credit card data security such a hot topic these days, now is a good time to make sure your systems are protected. For retailers, there are few things<a href=\"https:\/\/webcentsmagazine.com\/?p=1734\" title=\"Read more\" ><span style=\"color:#c92e2e;\">&#8230;Click to read more ><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":1710,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1734","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","content-print"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Lessons Every Business Can Learn From The Target Breach - webcentsmagazine.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/webcentsmagazine.com\/?p=1734\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Lessons Every Business Can Learn From The Target Breach - webcentsmagazine.com\" \/>\n<meta property=\"og:description\" content=\"5 Lessons Every Business Can Learn From The Target Breach March 2014 Integrated Solutions For Retailers By Jim Maloney, chief information security officer, Mercury Payment Systems With credit card data security such a hot topic these days, now is a good time to make sure your systems are protected. For retailers, there are few things...Click to read more &gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/webcentsmagazine.com\/?p=1734\" \/>\n<meta property=\"og:site_name\" content=\"webcentsmagazine.com\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-19T21:09:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-12-19T21:10:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/SharonStoffel_322x225.png\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"322\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Master Login Bean\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Master Login Bean\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/webcentsmagazine.com\/?p=1734\",\"url\":\"https:\/\/webcentsmagazine.com\/?p=1734\",\"name\":\"5 Lessons Every Business Can Learn From The Target Breach - webcentsmagazine.com\",\"isPartOf\":{\"@id\":\"https:\/\/webcentsmagazine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/webcentsmagazine.com\/?p=1734#primaryimage\"},\"image\":{\"@id\":\"https:\/\/webcentsmagazine.com\/?p=1734#primaryimage\"},\"thumbnailUrl\":\"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/SharonStoffel_322x225.png\",\"datePublished\":\"2016-12-19T21:09:08+00:00\",\"dateModified\":\"2018-12-19T21:10:36+00:00\",\"author\":{\"@id\":\"https:\/\/webcentsmagazine.com\/#\/schema\/person\/faf85f19c052c03301b3bad0ed430dc0\"},\"breadcrumb\":{\"@id\":\"https:\/\/webcentsmagazine.com\/?p=1734#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/webcentsmagazine.com\/?p=1734\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webcentsmagazine.com\/?p=1734#primaryimage\",\"url\":\"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/SharonStoffel_322x225.png\",\"contentUrl\":\"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/SharonStoffel_322x225.png\",\"width\":225,\"height\":322,\"caption\":\"Sharon Stoffel, Managing Editor\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/webcentsmagazine.com\/?p=1734#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/webcentsmagazine.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Lessons Every Business Can Learn From The Target Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/webcentsmagazine.com\/#website\",\"url\":\"https:\/\/webcentsmagazine.com\/\",\"name\":\"webcentsmagazine.com\",\"description\":\"Retailers: We\u2019re here to help you navigate the changing landscape of the internet to broaden your reach and grow your business.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/webcentsmagazine.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/webcentsmagazine.com\/#\/schema\/person\/faf85f19c052c03301b3bad0ed430dc0\",\"name\":\"Master Login Bean\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webcentsmagazine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/53a14b90318981ec41e7ff10839ebebd2381a54b9f73c1946089d60e68e12d38?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/53a14b90318981ec41e7ff10839ebebd2381a54b9f73c1946089d60e68e12d38?s=96&d=mm&r=g\",\"caption\":\"Master Login Bean\"},\"url\":\"https:\/\/webcentsmagazine.com\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Lessons Every Business Can Learn From The Target Breach - webcentsmagazine.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/webcentsmagazine.com\/?p=1734","og_locale":"en_US","og_type":"article","og_title":"5 Lessons Every Business Can Learn From The Target Breach - webcentsmagazine.com","og_description":"5 Lessons Every Business Can Learn From The Target Breach March 2014 Integrated Solutions For Retailers By Jim Maloney, chief information security officer, Mercury Payment Systems With credit card data security such a hot topic these days, now is a good time to make sure your systems are protected. For retailers, there are few things...Click to read more >","og_url":"https:\/\/webcentsmagazine.com\/?p=1734","og_site_name":"webcentsmagazine.com","article_published_time":"2016-12-19T21:09:08+00:00","article_modified_time":"2018-12-19T21:10:36+00:00","og_image":[{"width":225,"height":322,"url":"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/SharonStoffel_322x225.png","type":"image\/png"}],"author":"Master Login Bean","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Master Login Bean","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/webcentsmagazine.com\/?p=1734","url":"https:\/\/webcentsmagazine.com\/?p=1734","name":"5 Lessons Every Business Can Learn From The Target Breach - webcentsmagazine.com","isPartOf":{"@id":"https:\/\/webcentsmagazine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/webcentsmagazine.com\/?p=1734#primaryimage"},"image":{"@id":"https:\/\/webcentsmagazine.com\/?p=1734#primaryimage"},"thumbnailUrl":"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/SharonStoffel_322x225.png","datePublished":"2016-12-19T21:09:08+00:00","dateModified":"2018-12-19T21:10:36+00:00","author":{"@id":"https:\/\/webcentsmagazine.com\/#\/schema\/person\/faf85f19c052c03301b3bad0ed430dc0"},"breadcrumb":{"@id":"https:\/\/webcentsmagazine.com\/?p=1734#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/webcentsmagazine.com\/?p=1734"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webcentsmagazine.com\/?p=1734#primaryimage","url":"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/SharonStoffel_322x225.png","contentUrl":"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/SharonStoffel_322x225.png","width":225,"height":322,"caption":"Sharon Stoffel, Managing Editor"},{"@type":"BreadcrumbList","@id":"https:\/\/webcentsmagazine.com\/?p=1734#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/webcentsmagazine.com\/"},{"@type":"ListItem","position":2,"name":"5 Lessons Every Business Can Learn From The Target Breach"}]},{"@type":"WebSite","@id":"https:\/\/webcentsmagazine.com\/#website","url":"https:\/\/webcentsmagazine.com\/","name":"webcentsmagazine.com","description":"Retailers: We\u2019re here to help you navigate the changing landscape of the internet to broaden your reach and grow your business.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/webcentsmagazine.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/webcentsmagazine.com\/#\/schema\/person\/faf85f19c052c03301b3bad0ed430dc0","name":"Master Login Bean","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webcentsmagazine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/53a14b90318981ec41e7ff10839ebebd2381a54b9f73c1946089d60e68e12d38?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/53a14b90318981ec41e7ff10839ebebd2381a54b9f73c1946089d60e68e12d38?s=96&d=mm&r=g","caption":"Master Login Bean"},"url":"https:\/\/webcentsmagazine.com\/?author=2"}]}},"jetpack_featured_media_url":"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/SharonStoffel_322x225.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=\/wp\/v2\/posts\/1734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1734"}],"version-history":[{"count":1,"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=\/wp\/v2\/posts\/1734\/revisions"}],"predecessor-version":[{"id":2878,"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=\/wp\/v2\/posts\/1734\/revisions\/2878"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=\/wp\/v2\/media\/1710"}],"wp:attachment":[{"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}