10 Recommendations to Stop Cyberthreats in the Retail Sector

Security
06/06/2024

Cyberthreats Retail Sector

Given the rise of ecommerce, retail companies need to strengthen their cybersecurity policies.

Ricardo Pulgarín, cybersecurity expert at Cirion Technologies, shares essential strategies that every company in the digital environment should consider.

 

Ecommerce growth has yielded evolved security policies in the retail sector, with a renewed focus on the security of e-commerce platforms, protection of online payments, customer privacy and supply chain security, all of which show the imperative of adjusting to a constantly changing digital environment and protecting both company data and customer trust in an increasingly connected world.

“Retail sector companies are responsible for ensuring their customers’ data security through various preventative measures. To this end said companies must necessarily perform a thorough risk assessment associated with their information technology systems, identifying threats and estimating their likelihood and impact on the business alike,” said Ricardo Pulgarín, Security Sales Architecture Manager at Cirion Technologies.

Businesses and organizations should focus on reinforcing their cybersecurity schemes. To that end Pulgarín provides 10 recommendations  to strategically tackle potential threats:

1.- Protect recovery systems and back up data:

In the event of incidents caused by people, ransomware or natural disasters, adopting measures that allow rapid data and systems recovery is of the essence. To do this, you need to back up the data, perform recovery tests and have a plan in place to include the definition of the recovery point objective (RPO) and determine the frequency of backups, along with a recovery time objective (RTO).

2.- Run recovery drills

These actions are meant to ensure data availability, resource recovery, and that everything is working as expected. An appropriate communication throughout the command chain in place must be added together with the definition of teams’ and individuals’ responsibilities.

3.- Cybersecurity training and awareness

Establishing data security should be a company priority. Therefore, a cybersecurity training plan for employees is key, both to understand the risks to which the company may be exposed, and to understand the importance of owning their roles upon potential threats and being internal promoters of cyber defense.

4.- Define the attack surface

Organizations must be clear about the systems, devices and services required in their environment to keep their businesses online and an active inventory. This will help them identify their most vulnerable ends and draw a system recovery baseline.

5.- Audit and manage the most vulnerable devices

In order to achieve a comprehensive security strategy, having controls throughout all network critical points is key. Without a doubt, perimeter security matters; however to be effective, and considering users’ high mobility, it must be complemented with security on end-user devices.

6.- Network Segmentation

To help contain malware actions. If a threat enters the network, it must be “buried” to prevent it from moving uncontrollably and collecting information. To do this, it is necessary to “divide” the network into smaller sections, thus preventing threats from moving laterally, with better control of traffic flow among sections.

7.- Protect emails to thwart ransomware attack

In addition to network devices, you must as well ensure that email solutions are running their latest updates and have a secure infiltration protection.

8.- Enhance identity focus

Organizations need to implement multiple factor authentication mechanisms for their remote users and customers, which will enable higher validation of access authorization to their most critical information. Do not forget to monitor use of ports, protocols and services on the network to stop malicious applications from maintaining a security gap that can be exploited by the attacker.

9.- Consolidate security throughout the entire Cyber Kill Chain

The cybersecurity kill chain model identifies what cybercriminals do to achieve their goals. The possibility of human failure requires implementation of solid security technology and a cybersecurity strategy to integrate various controls and enable visualization of the different stages an attacker must go through before being successful.

10.- Have an incident response plan in place

A clearly defined, evaluated and proven incident response plan will contribute significantly to ensuring a better result in the event of cyberthreats.

 

Cirion owns a complete portfolio of security integrated solutions, with network protection and mitigation services, among others, customizable to any kind of industry requirements.

Artículos Recientes

Data Center Infrastructure: Key to Uninterrupted Gaming

by | Oct 2, 2025 | Data Center | 0 Comments

The video game sector, a global economic giant, depends on a fundamental pillar often invisible to the user: the infrastructure of Data Centers. These facilities are...

How Dense Interconnection Improves Hybrid Cloud Performance

by | Jul 30, 2025 | Actualizaciones de la web, IT Trends, Actualizaciones de la web | 0 Comments

No longer a fringe strategy, hybrid cloud is the backbone of modern IT, with the hybrid cloud market worth over USD172 billion in 2025.By blending the control of...

How to Migrate to the Cloud Securely and Successfully

by | Jun 10, 2025 | Actualizaciones de la web, IT Trends | 0 Comments

Cloud migration was once just a technological trend, but today it is a key strategy for companies that want to remain competitive in a constantly evolving digital...

The Importance of Security in Business Internet Solutions

by | Jun 3, 2025 | Actualizaciones de la web, IT Trends | 0 Comments

Main Cybersecurity Risks for Businesses Digital transformation brings great benefits but also exposes businesses to increasingly sophisticated cyber threats. Protecting...

What is Business Internet and Why Your Company Needs It

by | May 19, 2025 | Actualizaciones de la web, IT Trends | 0 Comments

What is Business Internet? Definition and main characteristics Business Internet is a connectivity solution specially designed to meet the needs of modern...

World Telecommunication Day: Connectivity and Progress in the Service of Humanity

by | May 17, 2025 | Actualizaciones de la web, IT Trends | 0 Comments

This May 17 marks World Telecommunication and Information Society Day, a date that invites us to reflect on the progress, opportunities, and challenges surrounding...

Business Collaboration: Key to Boosting Team Productivity

by | Mar 14, 2025 | Actualizaciones de la web, IT Trends | 0 Comments

Business Collaboration: Key to Boosting Team Productivity Collaboration is one of the pillars of labor management in modern organizations. From improving communication...

Fibra Oscura

How Dark Fiber Transforms Your Company’s Infrastructure

by | Feb 4, 2025 | Actualizaciones de la web, IT Trends, Actualizaciones de la web | 0 Comments

How Dark Fiber Transforms Your Company's Infrastructure In a world where connectivity defines the competitiveness of companies, the concept of Dark Fiber is gaining...

2024 governed by AI: Will the infrastructure move forward consolidation in 2025?

by | Dec 9, 2024 | Actualizaciones de la web, IT Trends | 0 Comments

2024 governed by AI: Will the infrastructure move forward consolidation in 2025?       2024 will be remembered as the year of the telecommunications...

Cirion celebrates a new anniversary with investments, expansions and strategic alliances

by | Aug 1, 2024 | Actualizaciones de la web | 0 Comments

  Today we are celebrating a very significant milestone in our history: a new anniversary as Cirion, a leading digital infrastructure and technology provider in...