CIO magazine has the 11 steps of the hack
Step 3 exploit a web vulnerability should have been remediated, although the hackers were in the network they would have had a harder time to attack.
Step 5-6 Stealing a token from Domain admins , although the password hash may have been removed somehow, the Domain account password guess and new account creation should have been stopped, or at least reviewed.
Step 9 Installing the malware and not removing it. This may happen in the best of days by unsuspecting users, and the offending software should have been removed.
It is woefully obvious that Target was lacking in many aspects of security policy and architecture.
How does your companies security compare?
We can help by reviewing your security profile and giving you a report to fix any problems with your staff.