How to Avoid a Data Breach: Five Tips for Retailers

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next How to Avoid a Data Breach: Five Tips for Retailers-3 Next

Recognize Data at Rest

Retailers are constantly storing information in multiple locations, usually for the customer's convenience. However, data stored on portable devices such as laptops or archived on servers is often forgotten and — as a result — becomes a prime target for hackers. Retailers must encrypt all data at rest. By doing so, there is little to no concern should a device be stolen or lost.

'Tis the season to be breached. The holiday shopping season is upon us, and after the year the retail industry had, both consumers and retailers have a right to be nervous. Breaches are inevitable, and hackers are sophisticated. For shoppers, these security concerns give consumers another reason to closely monitor checking and credit card accounts. Retailers, too, should stay vigilant for suspicious activity and consider their security strategy going into this shopping season.

WinMagic Data Security published "5 Observations of Retail Data Breaches: Why Encryption?," an eBook outlining how data encryption can augment the existing PCI Data Security Standard and solve the data-protection challenges facing the retail industry. Mark Hickman, COO at WinMagic Inc., has five best practices for retailers to remain safe this holiday season.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.