How to Avoid a Data Breach: Five Tips for Retailers

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next How to Avoid a Data Breach: Five Tips for Retailers-6 Next

Implement an Encryption Policy

Retailers need an encryption policy that is mandatory yet manageable. Role-based controls are also a critical component; this implies only specific individuals have the ability to control or access information. Routine and ongoing audits are also always recommended to ensure that a company's data security and encryption polices are constantly being enforced.

'Tis the season to be breached. The holiday shopping season is upon us, and after the year the retail industry had, both consumers and retailers have a right to be nervous. Breaches are inevitable, and hackers are sophisticated. For shoppers, these security concerns give consumers another reason to closely monitor checking and credit card accounts. Retailers, too, should stay vigilant for suspicious activity and consider their security strategy going into this shopping season.

WinMagic Data Security published "5 Observations of Retail Data Breaches: Why Encryption?," an eBook outlining how data encryption can augment the existing PCI Data Security Standard and solve the data-protection challenges facing the retail industry. Mark Hickman, COO at WinMagic Inc., has five best practices for retailers to remain safe this holiday season.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.