How to Avoid a Data Breach: Five Tips for Retailers

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next How to Avoid a Data Breach: Five Tips for Retailers-5 Next

Join Forces with a Security Expert

By partnering with a data security vendor, retailers can leave the managing of their security infrastructure up to the experts and focus on what's really important to their brand — selling merchandise and keeping customers happy. A partner can monitor and implement the most appropriate security measures in response to both current and emerging threats.

'Tis the season to be breached. The holiday shopping season is upon us, and after the year the retail industry had, both consumers and retailers have a right to be nervous. Breaches are inevitable, and hackers are sophisticated. For shoppers, these security concerns give consumers another reason to closely monitor checking and credit card accounts. Retailers, too, should stay vigilant for suspicious activity and consider their security strategy going into this shopping season.

WinMagic Data Security published "5 Observations of Retail Data Breaches: Why Encryption?," an eBook outlining how data encryption can augment the existing PCI Data Security Standard and solve the data-protection challenges facing the retail industry. Mark Hickman, COO at WinMagic Inc., has five best practices for retailers to remain safe this holiday season.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.