Retail security in the digital age

1 May 2017 Security Services & Risk Management, Retail (Industry)

The retail sector is transforming at a significant pace and there is a high adoptability to digital, if consumer digital uptake is any indication. As per IDC’s FutureScape: Worldwide Retail 2017 Predictions report, issued in November last year, by 2019 digital transformation investments will triple, drawing funds away from store capital and profoundly changing the retail industry. There is high value capture for retailer and high value creation for consumer but like all high valuables this too needs to be protected.

Sanjay Vaid.
Sanjay Vaid.

Retailers have been a target of cyber criminals for many years, given their access to vast volumes of customer data, such as banking and credit information and even personal information like identity numbers, addresses, and telephone numbers. This data offers a world of possibility for cyber criminals, from identity theft to fraudulent buying, to corporate espionage.

With retailers no longer confined to ­physical spaces, but launching online ­customer interaction platforms and ­eCommerce stores, data is not stored in ­systems accessible only by company ­employees anymore. Sensitive data traverses the Internet between customers, retailers, banks and other third-party enablers every second – rapidly increasing the opportunities cyber criminals have to hack systems and obtain valuable information. This has driven the need for retailers to focus more on securing their communication channels and access control.

The threat

Traditional IT systems were designed more with operational requirements than with security in mind and, often, security was only added to systems and data storage as an afterthought. As the value chain ecosystem evolves and companies and customers become digitised, security measures such as identity management, public key infrastructure (PKI), advanced threat protection (ATP), encryption and SIEM (security incident and event management) are becoming ever more necessary.

Today’s cyber criminal has multiple ‘doors’ it can attempt to access. Many retail mobile applications (apps) are interoperable with other apps, which can enable access and ­information sharing across these apps and hence access to different databases. If one of these is breached, the cyber criminal can potentially access information from another untrusted app on the mobile and access both financial and personal database which are required to conduct a cybercrime.

Many cyber criminals are hiding their ­malware embedded in pictures on e-mails or social media platforms, which often remain undetected as firewalls may not filter them. Also, there is a case of untrusted legacy hardware or software having malware giving access to cyber criminals.

Once a cyber criminal has access to an application or untrusted hardware or software in the system, it can sit quietly and undetected in the application/hardware/software, gathering information passed into or out of the application or network, such as passwords, and even accessing retailers’ transactional database servers. The criminal can then strike, using the gathered information to commit the likes of identity theft or fraud on a grand scale.

This can also lead to the breach in personal privacy policy compliance as the personal information about the citizen can be accessed and misused.

The security needs

There needs to be a prime directive among retailers to focus on having a 360-degree view of their security, and not just looking at the individual, traditional security measures. They need to be aware that the risk of breach sits where there is a touchpoint to the Internet, be it through a customer, employee or even a supplier. Mobile applications, content, social media platforms, cloud services, untrusted software or hardware and more are all potential entry points for a cyber criminal.

Retailers should look at all facets of security, including content security, perimeter security, advanced threat protection, identity and access management – which also include biometrics and access policies, SIEM, and Internet of Things security.

In essence, they should have an analytics dashboard which will enable them to see how the security landscape is functioning at any given time. An automated system which will provide an alert for any security incident, deviation from policy or procedures, controlling who accesses what, when, how and for what purpose. This will, in turn, lead to incident response and enable remediation. The report generated can provide descriptive, predictive and prescriptive analysis which can track trends which can help to pinpoint vulnerability in the organisation’s security posture.

International risk

From a different, yet no less important side, retailers should also consider the security requirements for international trading. Each country is at the different cycle of security maturity level, and retailers doing ­business across borders need to be aware of the limitations, risks and security requirements of transacting in and out of another country.

Compliance requirements for transaction vary from country to country, and data security, governance, intellectual property and privacy policy can vary from country to country. There can be a high deviation between the framework and implementation of cyber law and policy between countries. The countries at the beginning of the adoption curve of security regulations could put retailers from more mature security regulation countries at risk related to compliance, reputation and security breach.

The future of security

When we talk about the future of security, we need to understand that the future is now. There are many security developments happening on a global scale that is being put into effect even as you read this. South Africa is on par with the rest of the world, and we are already dabbling in artificial intelligence tools which deal with prescriptive analytics and behaviour analytics. As per the IDC forecast, artificial intelligence will change how 25% of merchants, marketers, planners, and operators work, improving productivity by 30% and KPIs by 10% to 20%.

AI systems can analyse behaviour patterns of how users log into systems and raise the alarm if a deviation is found. For example, it fingerprints behaviour over time, so if an employee who typically accesses a particular area of the network suddenly accesses areas of the network he or she does not usually access, or the way the password is typed, it raises a security incident alert. Similarly, GPS technology can be used by an AI system to detect if a login happens simultaneously from two different locations for same user – a sure sign of a breach or illegal access.

AI can also be tied into the fast-growing world of the IoT. IoT-enabled consumer ­electronics are entering the home, and ­personal information, such as banking details, are being stored within these devices, enabling automatic transacting. On the operation side IoT has a big role as per IDC. By 2019, robotics and IoT technologies will increase in-store, in-warehouse, and in-distribution centre productivity by 1,5 times for early adopting retailers and by three times for later adopters. This convergence of retail, banking, consumer electronics along with the big role of IoT and AI, all need to be looked at holistically from a security perspective, ensuring that data – and the businesses accessing that data – is protected at all costs.

We are in for exciting times in retail with digital bringing newer opportunity and platforms for business; security will ensure availability, integrity and confidentiality on these platforms and help uphold the brand’s image.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NIS2 compliance amplifies skills shortages and resource strain
Information Security Security Services & Risk Management
A new Censuswide survey, commissioned by Veeam Software reveals the significant impact on businesses as they adapt to this key cybersecurity directive, with 95% of EMEA businesses siphoning other budgets to try and meet compliance deadline.

Read more...
SA company develops world-first safe K9 training for drug detection
Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Understanding South Africa’s Cybercrimes Act
Information Security Security Services & Risk Management
The Cybercrimes Act No.19 of 2020 is a comprehensive legislative response to the evolving landscape of cyberthreats in South Africa. Its effectiveness, however, relies on enforcement, which relies on implementation, international cooperation, and collaboration between the public and private sectors.

Read more...
Partnership addresses fire hazard mitigation
Brigit Fire (a Division of Hudaco Trading) Elvey Security Technologies Fire & Safety Security Services & Risk Management
Brigit Fire has partnered with the Elvey Group. The collaboration will see Brigit Fire distributing both the advanced C-TEC addressable fire detection systems (CAST Technology) and GreenMist lithium extinguishers.

Read more...
Fire protection for a solvent extraction plant in Africa
FS Systems Fire & Safety Security Services & Risk Management Mining (Industry)
A prominent mining site operates a state-of-the-art solvent extraction (SX) plant, integral to separating and purifying metals from ores, which pose significant fire risks, as SX processes involve highly flammable organic solvents and elevated operating temperatures.

Read more...
Taking fire safety seriously
G2 Fire Editor's Choice Fire & Safety Security Services & Risk Management
To gain insights into how fire systems must be designed, installed and maintained, SMART Security Solutions asked Nichola Allan, MD of G2 Fire, for some insights into the local fire market.

Read more...
New data privacy trends increase large cyber claims
Security Services & Risk Management News & Events
Frequency and value of sizeable cyber insurance claims up 14% and 17% year-on-year in the first half of 2024, with a growing trend in the US for litigation against large corporations related to privacy violations.

Read more...
Streamlining and securing enterprise risk management
Security Services & Risk Management
[Sponsored] A new enterprise risk management web app from Zulu Consulting, called Risk-IO, is designed to automate and streamline the enterprise risk management process, ensuring no steps are skipped and everything is securely documented.

Read more...
Professional Firearms Trainers Council slams SASSETA’s skills programme
News & Events Security Services & Risk Management
The Professional Firearms Trainers Council (PFTC), the body responsible for private sector firearms training accreditation, has raised concerns with the Minister of Higher Education regarding a new skills programme proposed by SASSETA, which could put 42 000 jobs at risk.

Read more...
Data protection investments grow
Infrastructure Security Services & Risk Management
Senior IT professionals in small to large-sized businesses are allocating a significant portion of their IT budget to data protection and recovery, according to a recent survey from Arcserve.

Read more...