5 Cybersecurity Tips for Retailers on Black Friday

Today is Black Friday. Many retail stores in North American have customers lining up outside for hours to get the best deals. In 2015, 74.2 million people shopped on this day for your great deals! And around 30% of annual retail sales happen during the Black Friday through Boxing Day season, according to the National Retail Federation. With all this excitement of dropping prices and advertising to invite consumers to your stores, you are also potentially inviting cyber criminals that have been waiting for an opportunity to get information on your consumer data.  It was just 3 years ago that one of the biggest data breaches occurred when the credit/debit-cards of 110 million Target customers were compromised.  Breaches like this are a retailer’s worst nightmare, as they not only results in great costs to the corporation financially, but can tarnish the brand image as well, making consumers weary of shopping in your stores.

So there is no better time to offer our tips on how to stay secure this weekend:

  1. Partner with a Security Expert. In a lot of cases the organization is lacking the necessary talent, skills and budget to properly address security in-house. So partner up with a data security vendor that is equipped to ensure proper security measures are taken.
  2. Know where you Data Resides. Identify where your business is being conducted, identify data at rest, and locate data in transit that way you can work toward better securing your customer data.
  3. Encrypt, Encrypt, Encrypt! The best form of data security is data that is encrypted, so make sure to put a Data Encryption Policy in place.  So, if a cybercriminal ever got their hands on it, that data is rendered useless.
  4. Keep up to date with Payment Technology. Look into EMV Cards – these credit cards are smart cards that have chips that store their data on integrated circuits, rather than magnetic stripes. They are designed to prevent fraudulent transactions.
  5. Audit your Systems for Vulnerabilities. Evaluating your POS systems and providing workshops to educate your employees is not enough. You need to consider your organization’s Risk Management Profile. For each of your systems, you should look at how those systems are vulnerable and the probability that a threat agent will capitalize on those vulnerabilities.

If you are looking to safeguard your company’s most valuable asset – your data, Contact WinMagic or take a look at our eBook Five Observations of Retail Data Breaches.

Previous Post
Enablement of IT Security Admin through Seamless Adoption
Next Post
Increasing Effectiveness and Efficiency of Security Resources

Related Posts

Connect with us!

As 2014 kicks off, WinMagic will be attending a number of different events over the next few months.  In particular, we are excited to be attending our first Data Connectors of the year, being held at the Los Angeles Airport…
Read more

5 Myths About Data Encryption and Decryption

What do you know about data encryption and decryption? Whatever it is, it might not be fully right. There are myths circulating about this topic, myths which can actually hurt your business. We’ve identified five of them, and explain why they’re…

Nothing a patch can’t fix

Historically, when we’ve had to make updates to SecureDoc we’ve issued Service Releases (SRs) to address minor bug fixes, software update and feature additions. SRs enabled us to ensure continued compatibility with things such as Mac OS X updates. (more…)
Read more

Rethinking Data Security for the Public Cloud

For many, Cloud is a buzzword floating through cyber space. It is all too common to hear stories of data being compromised due to insecure Cloud hosting, spawning critical audit sweeps and apologetic corporations responding to upset customers—Yikes! (more…)
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.