Personalise customers’ in-store experiences. First step: security

Issue 5 2023 Retail (Industry), Information Security


Mark Scanlan.

Adding more personalised digital consumer experiences in the store, and on-the-go, opens the door for new opportunities … and vulnerabilities. Digital transformation enables retailers to meet consumers’ ever changing expectations across all channels, but also means potential exposure of highly valuable personal and financial data.

Protecting the consumer (and the brand) is part of the new retail experience that shoppers want and expect. Not to mention, integrating an effective security strategy brings the added bonus of mitigating the financial consequences of a security breach, a large portion of which are in domains other than IT.

Security at the core

Retailers already represented a major target for bad actors due to the amount of payment data and personally identifiable information (PII) that is held on consumers. During the pandemic, this was exacerbated because many retailers needed to rapidly pivot to meet the demands of a completely new and unexpected business landscape, often at the expense of solution security – it was viewed as ‘something we’ll take care of, once we catch our breath’. Ultimately, this resulted in a significant increase in cyberattacks against retailers, according to the FBI.

Consumers want to shop anywhere, anytime, on any device, while engaging with a retail brand – including online shopping while in-store. As a response, retailers are working towards providing a frictionless shopping experience where security is at the core. As such, the consumer’s device can both be at risk from the retailer’s environment, and conversely can form an attack vector into the environment. With so many digital touchpoints, an integrated, security-by-design, end-to-end solution has become critical.

Retailers know that security is of utmost importance now more than ever, but finding the right security solution that fits the size and subtleties of their enterprise and budget can be quite a daunting task. While a robust, resilient infrastructure, and network and endpoint security tools are essential enforcement mechanisms, cybersecurity starts with people and process – if appropriate policies are not defined and staff are not educated and trained, then an organisation can own every tool in existence, but they may be ineffective in their application.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
AI for retail risk management
Surveillance Retail (Industry) AI & Data Analytics
As businesses face mounting challenges in a volatile economic environment, Ares-i remains an essential tool for proactively identifying, assessing, and mitigating risks that threaten operational stability and customer satisfaction.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Vivotek partners to enhance retail management
Surveillance Retail (Industry) Products & Solutions AI & Data Analytics
Recognising the growing demand from retail enterprises to boost operational efficiency through cloud security solutions, Vivotek has announced a partnership between its AI-powered cloud surveillance platform, Vortex, and Kabob.

Read more...
Smart surveillance and cyber resilience
Axis Communications SA Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.

Read more...
Autonomous healing systems are the future
Infrastructure Information Security AI & Data Analytics
Autonomous healing software, an emerging technology, is gaining traction for its potential to transform how organisations manage software maintenance, security, and system performance.

Read more...
The future of retail security?
Retail (Industry) Surveillance AI & Data Analytics
South Africa experienced a 20% increase in shoplifting between 2022 and 2023, with the Western Cape and Gauteng seeing the highest spikes in this form of crime. The figures underscore the urgent need for enhanced security solutions to address the growing challenge.

Read more...