Mitigating The Security Risks Of Black Friday 

One of the biggest shopping events of the year is looming where busy retailers and eager shoppers are gearing up for Black Friday. Limited time offers encourage higher purchase numbers and rising sales, but businesses must also be aware of the increased risk of cyber attacks during this period.

Website traffic, online transactions and data transfers significantly rise during Black Friday as consumers take advantage of the unmissable deals and discounts on offer, and with more shoppers expected to shop online rather than in-store, retailers are a tempting target for cybercriminals looking to disrupt their operations. Businesses focus on allowing customers to conduct online transactions but they often fail to implement adequate cybersecurity measures, leaving them vulnerable to attacks. 

Protecting Data & Information

It’s paramount for retailers to ensure the security of their customer's data and personal information. Dominik Birgelen, CEO of oneclick AG explains that retailers' success during the Black Friday period depends on performance and security. He explains that “The right solutions, infrastructure and technical setup will support retailers during this time by ensuring lightning-fast and responsive e-commerce websites as well as uninterrupted service during peak demand.” He also adds that to effectively mitigate internal and external cybersecurity risks “Retailers need robust solutions that not only allow them to secure their assets but also to consistently monitor and spot malicious activities.”

The consequences of a cyberattack not only negatively impact sales, but are also extremely damaging to a retailer’s reputation, putting them at risk of losing their customers’ trust and loyalty. Some of the most common cyber security threats facing retailers include credential threats, phishing and bot scams, and insider threats

The majority of online users think that retailers are personally responsible for tackling these problems. Michael Jenkins, CTO at ThreatLocker agrees, stating “Organisations are responsible for protecting the data of their stakeholders, employees and customers, making them liable for implementing data breach prevention methods.”

Human error remains one of the largest contributors to cyber attacks, with 9 out of 10 of all data breaches being caused by employee mistakes. Michael also adds that “While operating on a tight schedule, an employee opening an inappropriate link, mistakenly giving users access to private information, or downloading compromised data can cause significant downtime, severely limiting businesses' ability to capitalise on Black Friday opportunities, loss of profit and damage to reputation.

“Businesses should prepare for the surge in cyberattacks during Black Friday by first educating their employees about potential threats and behaviours that make them vulnerable to ransomware and other potential threats.”

A Zero Trust Strategy

To effectively mitigate internal and external cybersecurity risks over the festive period, retailers need robust solutions that not only allow them to secure their assets but also to consistently monitor and spot malicious activities. Michael recommends zero trust, explaining that “The concept of ‘Zero Trust’ seeks to eliminate the idea of default access and trust. Just because a device is within a trusted firewall, network, or software, it does not mean that it should be trusted automatically. Zero Trust means that internal or external access is independently verified.

“Zero Trust is a comprehensive cybersecurity strategy that addresses both software and network vulnerabilities. Allowlisting and Ringfencing are examples of tools that, respectively, limit a single person's access to software and applications, as well as create firewall-like restrictions that limit application access to files, registry, the internet, and interaction with other applications."

Dominik also agrees that this strategy allows retailers to mitigate cyberattacks explaining “A Zero Trust Approach is a security framework that assumes no inherent trust within a network. It focuses on verifying every user and device attempting to access resources, regardless of their location or network. Retailers can adopt ZTA principles by implementing multifactor authentication, granular access controls, and continuous monitoring to ensure that only authorised entities can access sensitive data or systems.” 

Being Vigilant For An Attack

Fraudsters stole £580 million from British consumers and businesses in the first six months of 2023. Black Friday offers bad actors the chance to capitalise even further on these fraudulent attacks. Despite the technological advancements that have empowered businesses to bolster their cybersecurity, hackers continue to leverage the latest innovations to make their attacks more sophisticated.

This should act as a wake-up call for retailers to adopt a cybersecurity strategy and educate employees on the relevant tactics that can help them fend off a cyber attack this Black Friday.

Image: Unsplash+    thumbnail:  ElisaRiva

You Might Also Read:

Why Is Retail Cyber Security So Weak?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


« Australian Ports Recovering After Large-Scale Attack 
Surging Attacks On Israeli Websites »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

WatchGuard

WatchGuard

WatchGuard is a leader in network security, secure Wi-Fi, and network intelligence products and services for SMBs and Enterprises worldwide.

FireMon

FireMon

FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

PAX Momentum

PAX Momentum

PAX Momentum is the Mid-Atlantic’s premier startup accelerator, specializing in cyber, enterprise software, telecom, CleanTech, FinTech, InsureTech, and AI.

ITsMine

ITsMine

ITsMine’s Beyond DLP™? solution is a leading Data Loss Prevention (DLP) solution used by organizations to protect against internal and external threats automatically.

Mjenzi Cloud

Mjenzi Cloud

Mjenzi Cloud is a provider of cloud IaaS solutions including managed backup services, affordable & secure cloud virtual compute/storage/compute services, bare-metal services and cloud security.

MetaWeb Ventures

MetaWeb Ventures

MetaWeb Ventures is a global venture capital firm focused on pre-seed and seed investments in crypto start-ups.

Digital Intelligence

Digital Intelligence

Digital Intelligence offer a full array of products, forensic and e-discovery consulting services and training.

SecurEyes

SecurEyes

SecurEyes is a leading cybersecurity firm that provides specialised services, including cybersecurity assessments, managed services, and governance risk and compliance services.

NextGen Cyber Talent

NextGen Cyber Talent

NextGen Cyber Talent is a non-profit providing a platform to increase diversity and inclusion in the cybersecurity industry.

Tsaaro Academy

Tsaaro Academy

Tsaaro Academy is a unique privacy certification training platform and here you earn a privacy certification CEH, CISM and DPO from India’s No.1 Privacy training platform.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Synergy ECP

Synergy ECP

Synergy ECP has a talented, dedicated staff to provide a broad range of services to the defense and intelligence industries.