Personalise customers’ in-store experiences. First step: security

Issue 5 2023 Retail (Industry), Information Security


Mark Scanlan.

Adding more personalised digital consumer experiences in the store, and on-the-go, opens the door for new opportunities … and vulnerabilities. Digital transformation enables retailers to meet consumers’ ever changing expectations across all channels, but also means potential exposure of highly valuable personal and financial data.

Protecting the consumer (and the brand) is part of the new retail experience that shoppers want and expect. Not to mention, integrating an effective security strategy brings the added bonus of mitigating the financial consequences of a security breach, a large portion of which are in domains other than IT.

Security at the core

Retailers already represented a major target for bad actors due to the amount of payment data and personally identifiable information (PII) that is held on consumers. During the pandemic, this was exacerbated because many retailers needed to rapidly pivot to meet the demands of a completely new and unexpected business landscape, often at the expense of solution security – it was viewed as ‘something we’ll take care of, once we catch our breath’. Ultimately, this resulted in a significant increase in cyberattacks against retailers, according to the FBI.

Consumers want to shop anywhere, anytime, on any device, while engaging with a retail brand – including online shopping while in-store. As a response, retailers are working towards providing a frictionless shopping experience where security is at the core. As such, the consumer’s device can both be at risk from the retailer’s environment, and conversely can form an attack vector into the environment. With so many digital touchpoints, an integrated, security-by-design, end-to-end solution has become critical.

Retailers know that security is of utmost importance now more than ever, but finding the right security solution that fits the size and subtleties of their enterprise and budget can be quite a daunting task. While a robust, resilient infrastructure, and network and endpoint security tools are essential enforcement mechanisms, cybersecurity starts with people and process – if appropriate policies are not defined and staff are not educated and trained, then an organisation can own every tool in existence, but they may be ineffective in their application.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
Retailers under cyberattack
Retail (Industry)
For African retailers accelerating digital transformation, recent retail hacks in the UK serve as a crucial case study in what can go wrong when uptime, not just data, is under attack.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...
ISPA’s take-down process protects from local scams
News & Events Information Security
During the recent school holidays, parents could rest a little easier knowing that ISPA, SA’s official internet industry representative body, is removing an average of three to four problematic websites from the local internet every week.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.