Retail security in the digital age

1 May 2017 Security Services & Risk Management, Retail (Industry)

The retail sector is transforming at a significant pace and there is a high adoptability to digital, if consumer digital uptake is any indication. As per IDC’s FutureScape: Worldwide Retail 2017 Predictions report, issued in November last year, by 2019 digital transformation investments will triple, drawing funds away from store capital and profoundly changing the retail industry. There is high value capture for retailer and high value creation for consumer but like all high valuables this too needs to be protected.

Sanjay Vaid.
Sanjay Vaid.

Retailers have been a target of cyber criminals for many years, given their access to vast volumes of customer data, such as banking and credit information and even personal information like identity numbers, addresses, and telephone numbers. This data offers a world of possibility for cyber criminals, from identity theft to fraudulent buying, to corporate espionage.

With retailers no longer confined to ­physical spaces, but launching online ­customer interaction platforms and ­eCommerce stores, data is not stored in ­systems accessible only by company ­employees anymore. Sensitive data traverses the Internet between customers, retailers, banks and other third-party enablers every second – rapidly increasing the opportunities cyber criminals have to hack systems and obtain valuable information. This has driven the need for retailers to focus more on securing their communication channels and access control.

The threat

Traditional IT systems were designed more with operational requirements than with security in mind and, often, security was only added to systems and data storage as an afterthought. As the value chain ecosystem evolves and companies and customers become digitised, security measures such as identity management, public key infrastructure (PKI), advanced threat protection (ATP), encryption and SIEM (security incident and event management) are becoming ever more necessary.

Today’s cyber criminal has multiple ‘doors’ it can attempt to access. Many retail mobile applications (apps) are interoperable with other apps, which can enable access and ­information sharing across these apps and hence access to different databases. If one of these is breached, the cyber criminal can potentially access information from another untrusted app on the mobile and access both financial and personal database which are required to conduct a cybercrime.

Many cyber criminals are hiding their ­malware embedded in pictures on e-mails or social media platforms, which often remain undetected as firewalls may not filter them. Also, there is a case of untrusted legacy hardware or software having malware giving access to cyber criminals.

Once a cyber criminal has access to an application or untrusted hardware or software in the system, it can sit quietly and undetected in the application/hardware/software, gathering information passed into or out of the application or network, such as passwords, and even accessing retailers’ transactional database servers. The criminal can then strike, using the gathered information to commit the likes of identity theft or fraud on a grand scale.

This can also lead to the breach in personal privacy policy compliance as the personal information about the citizen can be accessed and misused.

The security needs

There needs to be a prime directive among retailers to focus on having a 360-degree view of their security, and not just looking at the individual, traditional security measures. They need to be aware that the risk of breach sits where there is a touchpoint to the Internet, be it through a customer, employee or even a supplier. Mobile applications, content, social media platforms, cloud services, untrusted software or hardware and more are all potential entry points for a cyber criminal.

Retailers should look at all facets of security, including content security, perimeter security, advanced threat protection, identity and access management – which also include biometrics and access policies, SIEM, and Internet of Things security.

In essence, they should have an analytics dashboard which will enable them to see how the security landscape is functioning at any given time. An automated system which will provide an alert for any security incident, deviation from policy or procedures, controlling who accesses what, when, how and for what purpose. This will, in turn, lead to incident response and enable remediation. The report generated can provide descriptive, predictive and prescriptive analysis which can track trends which can help to pinpoint vulnerability in the organisation’s security posture.

International risk

From a different, yet no less important side, retailers should also consider the security requirements for international trading. Each country is at the different cycle of security maturity level, and retailers doing ­business across borders need to be aware of the limitations, risks and security requirements of transacting in and out of another country.

Compliance requirements for transaction vary from country to country, and data security, governance, intellectual property and privacy policy can vary from country to country. There can be a high deviation between the framework and implementation of cyber law and policy between countries. The countries at the beginning of the adoption curve of security regulations could put retailers from more mature security regulation countries at risk related to compliance, reputation and security breach.

The future of security

When we talk about the future of security, we need to understand that the future is now. There are many security developments happening on a global scale that is being put into effect even as you read this. South Africa is on par with the rest of the world, and we are already dabbling in artificial intelligence tools which deal with prescriptive analytics and behaviour analytics. As per the IDC forecast, artificial intelligence will change how 25% of merchants, marketers, planners, and operators work, improving productivity by 30% and KPIs by 10% to 20%.

AI systems can analyse behaviour patterns of how users log into systems and raise the alarm if a deviation is found. For example, it fingerprints behaviour over time, so if an employee who typically accesses a particular area of the network suddenly accesses areas of the network he or she does not usually access, or the way the password is typed, it raises a security incident alert. Similarly, GPS technology can be used by an AI system to detect if a login happens simultaneously from two different locations for same user – a sure sign of a breach or illegal access.

AI can also be tied into the fast-growing world of the IoT. IoT-enabled consumer ­electronics are entering the home, and ­personal information, such as banking details, are being stored within these devices, enabling automatic transacting. On the operation side IoT has a big role as per IDC. By 2019, robotics and IoT technologies will increase in-store, in-warehouse, and in-distribution centre productivity by 1,5 times for early adopting retailers and by three times for later adopters. This convergence of retail, banking, consumer electronics along with the big role of IoT and AI, all need to be looked at holistically from a security perspective, ensuring that data – and the businesses accessing that data – is protected at all costs.

We are in for exciting times in retail with digital bringing newer opportunity and platforms for business; security will ensure availability, integrity and confidentiality on these platforms and help uphold the brand’s image.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...
Don’t Miss the Exclusive Launch of the AirXpress 3 SCBA
Security Services & Risk Management
Be the first to experience the all-new AirXpress 3 Self-Contained Breathing Apparatus (SCBA), designed and manufactured by MSA, and brought to you by PSA Africa.

Read more...
Transform WhatsApp chaos into real-time security intelligence
Security Services & Risk Management
The HYDRA AI security intelligence software plugs into existing guard chat groups to automatically convert voice notes, photos, and texts into structured, real-time security data and insights.

Read more...
SABRIC Annual Crime Statistics 2024
News & Events Security Services & Risk Management Residential Estate (Industry)
SABRIC has released its Annual Crime Statistics for 2024, reflecting a significant decline in financial crime losses, but also warning of the growing threat posed by artificial intelligence (AI) in fraud schemes.

Read more...
Health, safety, and environmental eLearning
Training & Education Security Services & Risk Management
SHEilds is a global leader in health, safety, and environmental eLearning, delivering internationally recognised qualifications such as NEBOSH, IOSH, IEMA, and ProQual NVQs.

Read more...
See crime stopped in seconds
Products & Solutions Security Services & Risk Management
Fog Bandit, a leader in security fog, is bringing its instant crime-stopping technology to Securex Cape Town 2025. Experience the innovation trusted worldwide to protect retailers, warehouses, and high-value sites.

Read more...
SA’s private security industry receives multi-million USD investment
News & Events Security Services & Risk Management
South Africa's private security sector has attracted significant international attention, with the world’s largest tactical flashlight manufacturer, Nextorch, announcing a major investment in its local operations, Nextorch Africa.

Read more...
Vetting people in security estates
iFacts Security Services & Risk Management Residential Estate (Industry)
In today’s security-conscious South Africa, estate management’s responsibility extends beyond gates and patrols; it involves ensuring that every resident, staff member, and service provider upholds the community’s safety standards.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.