How to Avoid a Data Breach: Five Tips for Retailers

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next How to Avoid a Data Breach: Five Tips for Retailers-3 Next

Recognize Data at Rest

Retailers are constantly storing information in multiple locations, usually for the customer's convenience. However, data stored on portable devices such as laptops or archived on servers is often forgotten and — as a result — becomes a prime target for hackers. Retailers must encrypt all data at rest. By doing so, there is little to no concern should a device be stolen or lost.

'Tis the season to be breached. The holiday shopping season is upon us, and after the year the retail industry had, both consumers and retailers have a right to be nervous. Breaches are inevitable, and hackers are sophisticated. For shoppers, these security concerns give consumers another reason to closely monitor checking and credit card accounts. Retailers, too, should stay vigilant for suspicious activity and consider their security strategy going into this shopping season.

WinMagic Data Security published "5 Observations of Retail Data Breaches: Why Encryption?," an eBook outlining how data encryption can augment the existing PCI Data Security Standard and solve the data-protection challenges facing the retail industry. Mark Hickman, COO at WinMagic Inc., has five best practices for retailers to remain safe this holiday season.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.