{"id":1736,"date":"2014-05-20T12:58:36","date_gmt":"2014-05-20T19:58:36","guid":{"rendered":"http:\/\/webcentsmagazine.com\/?p=1736"},"modified":"2014-05-20T12:58:36","modified_gmt":"2014-05-20T19:58:36","slug":"5-lessons-every-business-can-learn-from-the-target-breach","status":"publish","type":"post","link":"https:\/\/webcentsmagazine.com\/?p=1736","title":{"rendered":"5 Lessons Every Business Can Learn From The Target Breach"},"content":{"rendered":"By Jim Maloney, Chief Information Security Officer, Mercury Payment Systems\r\nWith credit card data security such a hot topic these days, now is a good time to make sure your systems are protected.\r\nFor retailers, there are few things more threatening than a security breach. Knowing that large retailers with sophisticated security controls, like Target, are vulnerable does not put those fears to rest.\r\n\r\nAs new details emerge about the Target breach, there are lessons for retailers to help them p<div class=\"leaky_paywall_message_wrap\"><div id=\"leaky_paywall_message\"><a href=\"https:\/\/webcentsmagazine.com\/?page_id=1968\" style=\"text-decoration:underline; color:#e92a29; font-weight:bold;\">Subscribe or log in<\/a> to read the rest of this article. Subscription includes access to the website and <strong> all articles<\/strong>.<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>By Jim Maloney, Chief Information Security Officer, Mercury Payment Systems With credit card data security such a hot topic these days, now is a good time to make sure your systems are protected. For retailers, there are few things more threatening than a security breach. Knowing that large retailers with sophisticated security controls, like Target,<a href=\"https:\/\/webcentsmagazine.com\/?p=1736\" title=\"Read more\" ><span style=\"color:#c92e2e;\">&#8230;Click to read more ><\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":1759,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[205,12],"tags":[],"class_list":["post-1736","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-technology","content-print"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Lessons Every Business Can Learn From The Target Breach - webcentsmagazine.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/webcentsmagazine.com\/?p=1736\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Lessons Every Business Can Learn From The Target Breach - webcentsmagazine.com\" \/>\n<meta property=\"og:description\" content=\"By Jim Maloney, Chief Information Security Officer, Mercury Payment Systems With credit card data security such a hot topic these days, now is a good time to make sure your systems are protected. For retailers, there are few things more threatening than a security breach. Knowing that large retailers with sophisticated security controls, like Target,...Click to read more &gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/webcentsmagazine.com\/?p=1736\" \/>\n<meta property=\"og:site_name\" content=\"webcentsmagazine.com\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-20T19:58:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/Security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"520\" \/>\n\t<meta property=\"og:image:height\" content=\"320\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/webcentsmagazine.com\/?p=1736\",\"url\":\"https:\/\/webcentsmagazine.com\/?p=1736\",\"name\":\"5 Lessons Every Business Can Learn From The Target Breach - webcentsmagazine.com\",\"isPartOf\":{\"@id\":\"https:\/\/webcentsmagazine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/webcentsmagazine.com\/?p=1736#primaryimage\"},\"image\":{\"@id\":\"https:\/\/webcentsmagazine.com\/?p=1736#primaryimage\"},\"thumbnailUrl\":\"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/Security.png\",\"datePublished\":\"2014-05-20T19:58:36+00:00\",\"author\":{\"@id\":\"https:\/\/webcentsmagazine.com\/#\/schema\/person\/ff9c7bb6625d8970ffde5a07b87d7692\"},\"breadcrumb\":{\"@id\":\"https:\/\/webcentsmagazine.com\/?p=1736#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/webcentsmagazine.com\/?p=1736\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webcentsmagazine.com\/?p=1736#primaryimage\",\"url\":\"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/Security.png\",\"contentUrl\":\"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/Security.png\",\"width\":520,\"height\":320},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/webcentsmagazine.com\/?p=1736#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/webcentsmagazine.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Lessons Every Business Can Learn From The Target Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/webcentsmagazine.com\/#website\",\"url\":\"https:\/\/webcentsmagazine.com\/\",\"name\":\"webcentsmagazine.com\",\"description\":\"Retailers: We\u2019re here to help you navigate the changing landscape of the internet to broaden your reach and grow your business.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/webcentsmagazine.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/webcentsmagazine.com\/#\/schema\/person\/ff9c7bb6625d8970ffde5a07b87d7692\",\"name\":\"Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webcentsmagazine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/af5fb2ba49ebca7a2a61b33a7aac743d32d14d61c4f25f6018f276d6155cfade?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/af5fb2ba49ebca7a2a61b33a7aac743d32d14d61c4f25f6018f276d6155cfade?s=96&d=mm&r=g\",\"caption\":\"Staff\"},\"url\":\"https:\/\/webcentsmagazine.com\/?author=9\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Lessons Every Business Can Learn From The Target Breach - webcentsmagazine.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/webcentsmagazine.com\/?p=1736","og_locale":"en_US","og_type":"article","og_title":"5 Lessons Every Business Can Learn From The Target Breach - webcentsmagazine.com","og_description":"By Jim Maloney, Chief Information Security Officer, Mercury Payment Systems With credit card data security such a hot topic these days, now is a good time to make sure your systems are protected. For retailers, there are few things more threatening than a security breach. Knowing that large retailers with sophisticated security controls, like Target,...Click to read more >","og_url":"https:\/\/webcentsmagazine.com\/?p=1736","og_site_name":"webcentsmagazine.com","article_published_time":"2014-05-20T19:58:36+00:00","og_image":[{"width":520,"height":320,"url":"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/Security.png","type":"image\/png"}],"author":"Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Staff","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/webcentsmagazine.com\/?p=1736","url":"https:\/\/webcentsmagazine.com\/?p=1736","name":"5 Lessons Every Business Can Learn From The Target Breach - webcentsmagazine.com","isPartOf":{"@id":"https:\/\/webcentsmagazine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/webcentsmagazine.com\/?p=1736#primaryimage"},"image":{"@id":"https:\/\/webcentsmagazine.com\/?p=1736#primaryimage"},"thumbnailUrl":"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/Security.png","datePublished":"2014-05-20T19:58:36+00:00","author":{"@id":"https:\/\/webcentsmagazine.com\/#\/schema\/person\/ff9c7bb6625d8970ffde5a07b87d7692"},"breadcrumb":{"@id":"https:\/\/webcentsmagazine.com\/?p=1736#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/webcentsmagazine.com\/?p=1736"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webcentsmagazine.com\/?p=1736#primaryimage","url":"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/Security.png","contentUrl":"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/Security.png","width":520,"height":320},{"@type":"BreadcrumbList","@id":"https:\/\/webcentsmagazine.com\/?p=1736#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/webcentsmagazine.com\/"},{"@type":"ListItem","position":2,"name":"5 Lessons Every Business Can Learn From The Target Breach"}]},{"@type":"WebSite","@id":"https:\/\/webcentsmagazine.com\/#website","url":"https:\/\/webcentsmagazine.com\/","name":"webcentsmagazine.com","description":"Retailers: We\u2019re here to help you navigate the changing landscape of the internet to broaden your reach and grow your business.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/webcentsmagazine.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/webcentsmagazine.com\/#\/schema\/person\/ff9c7bb6625d8970ffde5a07b87d7692","name":"Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webcentsmagazine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/af5fb2ba49ebca7a2a61b33a7aac743d32d14d61c4f25f6018f276d6155cfade?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/af5fb2ba49ebca7a2a61b33a7aac743d32d14d61c4f25f6018f276d6155cfade?s=96&d=mm&r=g","caption":"Staff"},"url":"https:\/\/webcentsmagazine.com\/?author=9"}]}},"jetpack_featured_media_url":"https:\/\/webcentsmagazine.com\/wp-content\/uploads\/2014\/05\/Security.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=\/wp\/v2\/posts\/1736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1736"}],"version-history":[{"count":9,"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=\/wp\/v2\/posts\/1736\/revisions"}],"predecessor-version":[{"id":1751,"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=\/wp\/v2\/posts\/1736\/revisions\/1751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=\/wp\/v2\/media\/1759"}],"wp:attachment":[{"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webcentsmagazine.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}