How Retailers Navigate Through Unpredictability And New Risks

How Retailers Navigate Through Unpredictability And New Risks

Over the past year, the retail industry has increased its focus on online shopping and adapted to increasing levels of digital traffic, shifts in customer behavior and cyberthreats such as account takeover, web scraping, denial of inventory and scalping attacks. In a recent panel, PerimeterX hosted Jenna Posner, VP of Digital at SNIPES, Quentyn Taylor, Director of Information Security at Canon Europe and Beth Moriarty, VP of Marketing at Yottaa, a PerimeterX partner to share insights on how leading e-commerce retailers are responding to these three key trends. Watch the full webinar here.

Increased Levels of Digital Traffic

Consumers spent $861.12 billion online with U.S. merchants in 2020, up an incredible 44.0% year over year, according to Digital Commerce 360 estimates. That’s the highest annual U.S. e-commerce growth in the past two decades and nearly triple the 15.1% jump in 2019. More transactions means more opportunities for malicious activity.

How has your business adapted to the increase in digital traffic this past year and how has this impacted your plans looking forward?

Jenna Posner: The retail industry has been really impressive over the past year, looking at not only customer expectations, but demands within the climate that we’re living in and knowing that we have to make these investments and changes in order to survive. We are seeing about three times our normal traffic. One of the things we’ve done to help manage that traffic on the frontend is to use PerimeterX to make sure that traffic is not bot activity — it’s humans coming to our site.

Quentyn Taylor: There’s been a massive increase in traffic. People were already shopping very heavily online. I don’t think they’re going to be going back to shopping in-store so much. Especially with consumer electronics, it’s (Read more...)

*** This is a Security Bloggers Network syndicated blog from PerimeterX Blog authored by PerimeterX Blog. Read the original post at: