Monday, May 29, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About Us
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • How to Secure Your SCM Repositories with GitGuardian Honeytokens
  • From Data Chaos to Data Mastery How to Build and Scale Data Lakes with AWS Services
  • Protecting your business: Advice to SMB CEOs from a former CIO
  • The Top Threats to Cloud Infrastructure Security and How to Address Them
  • United States of America: Memorial Day 2023
Careers Security Awareness Security Bloggers Network 

Home » Cybersecurity » Careers » ‘Tis the Season to be a Prudent Retailer

SBN

‘Tis the Season to be a Prudent Retailer

by Lane Thames on December 12, 2018

‘Tis the season to be shopping, as some might say. Holiday seasons are very good for retail businesses, with increased traffic in both online and brick-and-mortar stores.

DevOps ConnectSponsorships Available

Unfortunately, business is good for cybercriminals during these busing shopping times, too – and, as a result, retailers need to ensure that their physical and cyber resources are safe and secure.

This is never an easy task, especially at busy times like Thanksgiving and Christmas. However, a few extra steps to increase security can go a long way.

Here are a few tips to become a more prudent retailer:

1) Awareness, awareness, awareness

Businesses that increase their staffing seasonally, as with the Christmas holidays, should ensure that their seasonal (and regular employees) are aware of security impacts for the business. Employees should be told about processes such as using strong passwords, keeping terminals locked when not in use, refraining from writing down passwords or sensitive information, etc.

2) Principle of least privilege

For seasonal workers, retailers should have good on-boarding and off-boarding processes in place. These times of the year can be very busy (hence, the need for extra staffing). This is not a good time to let critical processes slip through. Ensure that seasonal staff only have limited access to cyber resources; ensure they are given adequate training on security aspects of the business, both physical and virtual; and ensure that accounts are disabled and/or removed during the off-boarding process.

3) Physical security

Brick-and-mortar retailers should ramp up physical security measures during the holidays. Special attention should be paid for Point of Sale (POS) terminals. Any signs of tampering should raise concerns. Also, credit card terminals should be regularly inspected for credit card skimming devices.

4) Trust but verify

Fraudulent check and credit card usage can increase during the holidays. (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Lane Thames. Read the original post at: https://www.tripwire.com/state-of-security/featured/tis-season-prudent-retailer/

December 12, 2018December 12, 2018 Lane Thames christmas, Featured Articles, retailers, Security Awareness, security tips
  • ← XKCD, FDR
  • Why You Need a Concrete Incident Response Plan (Not Strategy) →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Mon 29

Simplify, Secure, Strengthen: Implementing Zero-Trust Across Your Endpoints

May 17 @ 1:00 pm - July 12 @ 2:00 pm
Tue 30

Malicious Packages Special Report: Attacks Move Beyond Vulnerabilities

May 30 @ 1:00 pm - 2:00 pm
Jun 05

Securing Open Source

June 5 @ 1:00 pm - 2:00 pm
Jun 08

ActiveState Workshop: Building Secure and Reproducible Open Source Runtimes

June 8 @ 1:00 pm - 2:00 pm
Jun 13

Uncovering the Hidden Cybersecurity Threat in Your Organization

June 13 @ 1:00 pm - 2:00 pm
Jun 14

Enrich Security Investigations With ServiceNow Asset Data in Snowflake

June 14 @ 3:00 pm - July 24 @ 4:00 pm
Jun 15

Securing Containers & Kubernetes With AWS And Calico

June 15 @ 3:00 pm - 4:30 pm
Jun 22

Strange Bedfellows: Software, Security and the Law

June 22 @ 11:00 am - 12:00 pm
Jun 22

Sneak Peek: Cloud Security Prioritized With Sonrai

June 22 @ 1:00 pm - 2:00 pm
Jun 22

Unleash the Potential of Your Log and Event Data, Including AI’s Growing Impact

June 22 @ 3:00 pm - 4:00 pm

More Webinars

Subscribe to our Newsletters

TSTV Podcast

Most Read on the Boulevard

COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT
U.S.-South Korea Forge Strategic Cybersecurity Framework
Attackers Manipulate Teams Features to Gain Access
It’s Time to Reevaluate Your Enterprise Remediation Strategy
Revolutionize Zero-Trust Security With a Converged Identity Platform
Critical Vulnerability in Zyxel Network Appliances Exploited, PoC Scripts Circulating
Is Your SIEM Strategy Failing You? Here’s Why AI-Powered XDR Might Be The Answer
Semperis Recovery for Azure AD: Protecting Critical Resources
What are FedRAMP Requirements? (And Who Needs to Know)
2023 State of the Threat for eCommerce and Travel

Download Free eBook

7 Must-Read eBooks for Security Professionals

Industry Spotlight

Dell Launches Project Fort Zero Service to Accelerate Zero-Trust IT Shift
Cybersecurity Data Security Featured Governance, Risk & Compliance Incident Response Industry Spotlight News Security Boulevard (Original) Spotlight 

Dell Launches Project Fort Zero Service to Accelerate Zero-Trust IT Shift

May 23, 2023 Michael Vizard | May 23 0
Facebook Fined $1.3B — Zuckerberg Furious in GDPR Fight
Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threats & Breaches 

Facebook Fined $1.3B — Zuckerberg Furious in GDPR Fight

May 22, 2023 Richi Jennings | May 22 0
Google Chrome 3rd Party Cookies Crumbling — Finally!
Analytics & Intelligence API Security Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Security Operations Spotlight Threat Intelligence Threats & Breaches 

Google Chrome 3rd Party Cookies Crumbling — Finally!

May 19, 2023 Richi Jennings | May 19 0

Top Stories

COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT
Analytics & Intelligence API Security Cloud Security Cyberlaw Cybersecurity Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response IOT IoT & ICS Security Malware Most Read This Week Network Security News Popular Post Security Boulevard (Original) Security Operations Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT

May 26, 2023 Richi Jennings | 3 days ago 0
Federal Appellate Court Approves ‘Pretext’ Border Search
Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access News Security Boulevard (Original) 

Federal Appellate Court Approves ‘Pretext’ Border Search

May 26, 2023 Mark Rasch | 3 days ago 0
U.S.-South Korea Forge Strategic Cybersecurity Framework
Cybersecurity Featured Governance, Risk & Compliance News Security Boulevard (Original) Spotlight Threat Intelligence 

U.S.-South Korea Forge Strategic Cybersecurity Framework

May 25, 2023 Christopher Burgess | 4 days ago 0

Security Humor

Daniel Stori's ‘# $ To Devops Or Not To Devops’

Daniel Stori’s ‘# $ To Devops Or Not To Devops’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.