‘Tis the Season… to Watch Out for Breaches

Whether you’re ready to admit it or not, the holiday shopping season is upon us. Take a minute and ask yourself: what kind of shopper am I? Do you tend to finish your gift-giving excursions back in August, or will you be spending the night before your holiday scrounging for last minute ideas? Regardless of which bucket you fall into, there are two upcoming days dedicated solely to shoppers of all kinds: Black Friday and Cyber Monday. If waking up at the crack of dawn on Black Friday to fight other disgruntled parents over the latest toy craze doesn’t appeal to you, wait a few days after the U.S. Thanksgiving holiday and boot up your PC for Cyber Monday. It’s time to shop!

While many of you may be scared to check your bank account balances at the end of the season, put yourself in a retail shop’s shoes. The 2013 Target hack and 2014 Home Depot breach have both left retail stores of all shapes and sizes shaking in their boots – and with good reason! Hackers are not just becoming more persistent and frequent in their attacks, they are also getting more advanced on the attack methodology. What are these retailers left to do? Close up shop? No need to give up so easily; there are still lessons to be learned on how retailers can better protect their customers’ credit card and personal info safe from a potential breach.

A few things to consider when working towards a more secure environment for customer’s financial data:

  • Know where your business is being conducted
  • Locate data in transit

And most importantly:

  • Have an encryption policy

Interested in learning more?

Check out our recently published eBook, “Five Observations of Retail Data Breaches: Why Include Encryption?”. Happy shopping!

Previous Post
Retailers – Why Include Encryption?
Next Post
Is Encryption Dead?

Related Posts

Is that laptop worth $7 million?

One of the key examples I use when talking about the importance of data encryption is the value of the data that could potentially be exposed. Is a $900 laptop worth the $1 million or more of liability potential if…

Security Measures to Think About

Everyone is weary of hackers and the damages that they can cause, as seen with the Heartbleed Bug and Shellshock Bash. But hacking attacks can also mean physical security breaches, as hackers do not always have to resort to intricate…

Windows 8 is here! Now what?

As someone that’s worked in IT for the better part of 14 years, I’ve seen my fair share of product launches. When it comes to operating systems, it’s always a cyclical engine; big flurry of attention at launch followed by…

Making the Case for Data Encryption

In August, we released the results of a survey we did with the Ponemon Institute where we examined the Total Cost of Ownership (TCO) for data encryption. To make this information even clearer, we’ve now created a handy, easy to…

Leave a Reply

Your email address will not be published.

Fill out this field
Fill out this field
Please enter a valid email address.

Menu
Contact Us

This will close in 15 seconds