10 Recommendations to Stop Cyberthreats in the Retail Sector

Security
06/06/2024

Cyberthreats Retail Sector

Given the rise of ecommerce, retail companies need to strengthen their cybersecurity policies.

Ricardo Pulgarín, cybersecurity expert at Cirion Technologies, shares essential strategies that every company in the digital environment should consider.

 

Ecommerce growth has yielded evolved security policies in the retail sector, with a renewed focus on the security of e-commerce platforms, protection of online payments, customer privacy and supply chain security, all of which show the imperative of adjusting to a constantly changing digital environment and protecting both company data and customer trust in an increasingly connected world.

“Retail sector companies are responsible for ensuring their customers’ data security through various preventative measures. To this end said companies must necessarily perform a thorough risk assessment associated with their information technology systems, identifying threats and estimating their likelihood and impact on the business alike,” said Ricardo Pulgarín, Security Sales Architecture Manager at Cirion Technologies.

Businesses and organizations should focus on reinforcing their cybersecurity schemes. To that end Pulgarín provides 10 recommendations  to strategically tackle potential threats:

1.- Protect recovery systems and back up data:

In the event of incidents caused by people, ransomware or natural disasters, adopting measures that allow rapid data and systems recovery is of the essence. To do this, you need to back up the data, perform recovery tests and have a plan in place to include the definition of the recovery point objective (RPO) and determine the frequency of backups, along with a recovery time objective (RTO).

2.- Run recovery drills

These actions are meant to ensure data availability, resource recovery, and that everything is working as expected. An appropriate communication throughout the command chain in place must be added together with the definition of teams’ and individuals’ responsibilities.

3.- Cybersecurity training and awareness

Establishing data security should be a company priority. Therefore, a cybersecurity training plan for employees is key, both to understand the risks to which the company may be exposed, and to understand the importance of owning their roles upon potential threats and being internal promoters of cyber defense.

4.- Define the attack surface

Organizations must be clear about the systems, devices and services required in their environment to keep their businesses online and an active inventory. This will help them identify their most vulnerable ends and draw a system recovery baseline.

5.- Audit and manage the most vulnerable devices

In order to achieve a comprehensive security strategy, having controls throughout all network critical points is key. Without a doubt, perimeter security matters; however to be effective, and considering users’ high mobility, it must be complemented with security on end-user devices.

6.- Network Segmentation

To help contain malware actions. If a threat enters the network, it must be “buried” to prevent it from moving uncontrollably and collecting information. To do this, it is necessary to “divide” the network into smaller sections, thus preventing threats from moving laterally, with better control of traffic flow among sections.

7.- Protect emails to thwart ransomware attack

In addition to network devices, you must as well ensure that email solutions are running their latest updates and have a secure infiltration protection.

8.- Enhance identity focus

Organizations need to implement multiple factor authentication mechanisms for their remote users and customers, which will enable higher validation of access authorization to their most critical information. Do not forget to monitor use of ports, protocols and services on the network to stop malicious applications from maintaining a security gap that can be exploited by the attacker.

9.- Consolidate security throughout the entire Cyber Kill Chain

The cybersecurity kill chain model identifies what cybercriminals do to achieve their goals. The possibility of human failure requires implementation of solid security technology and a cybersecurity strategy to integrate various controls and enable visualization of the different stages an attacker must go through before being successful.

10.- Have an incident response plan in place

A clearly defined, evaluated and proven incident response plan will contribute significantly to ensuring a better result in the event of cyberthreats.

 

Cirion owns a complete portfolio of security integrated solutions, with network protection and mitigation services, among others, customizable to any kind of industry requirements.

Share

Recent Posts

2024 governed by AI: Will the infrastructure move forward consolidation in 2025?

by | Dec 9, 2024 | IT Trends,IT Trends | 0 Comments

2024 governed by AI: Will the infrastructure move forward consolidation in 2025?     2024 will be remembered as the year of the telecommunications revolution....

Business Phone Service for organizations today

by | Dec 2, 2024 | UC&C | 0 Comments

Business Phone Service for organizations today   Cloud systems are a great option for business telephone service due to their Voice over Internet Protocol (VoIP)...

Sustainable digital infrastructure: Engine for innovation, competitiveness, and energy savings

by | Nov 19, 2024 | Data Center & Hybrid Cloud | 0 Comments

Sustainable digital infrastructure: Engine for innovation, competitiveness, and energy savings   How can companies shrink the environmental impact caused by the...

en el sector retail

The meeting rooms of the future

by | Oct 31, 2024 | UC&C | 0 Comments

Creating Collaborative, Future-Ready Meeting Spaces   Today’s technology is already enabling collaborative, immersive and highly productive meetings, offering a...

Data Centers, Free Energy Market, and ESG

by | Oct 3, 2024 | IT Trends | 0 Comments

Data Centers, Free Energy Market, and ESG New emerging technologies and services such as Artificial Intelligence and the crypto market, among others, are accelerating...

Happy CX Day 2024!

by | Oct 1, 2024 | IT Trends | 0 Comments

Happy CX Day 2024!    At Cirion, every interaction counts, and your trust is the engine that drives us to continue growing and innovating. From the beginning, we...

CDN, Emotion, and Security

by | Sep 25, 2024 | IT Trends | 0 Comments

CDN, Emotion, and Security   Nowadays, if you’re able to follow sports events, concerts, and games in real time and with high quality sound and image – and feel...

Data Center Certifications and Compliances strengthen quality of service

by | Sep 23, 2024 | IT Trends | 0 Comments

Data Center Certifications and Compliances strengthen quality of service and contribute to market competitiveness   With 18 Data Centers in Latin America, Cirion’s...

What specific tasks can AI automate?

by | Sep 16, 2024 | UC&C | 0 Comments

Transforming Productivity: Key Tasks AI Can Automate for Businesses What specific tasks can AI automate?   Generative AI has not just changed all professions, it's...

Data Center

AI and corporate digital transformation

by | Aug 22, 2024 | IT Trends | 0 Comments

Overcoming Early-Stage AI Challenges: Insights and Solutions for Businesses Artificial Intelligence early stage: Artificial Intelligence (AI) is emerging as one of the...