background
avatar
Autor
Paweł Kruszec

Retail chains facing cyberthreats

Find out more

Every year media reports on major security incidents among major retail chains. One of the most famous was the data leak from US shopping networks Target, which happened in 2013. Sensitive customer data, including credit card numbers became an easy prey for hackers. What’s more, in recent years a similar attack was experienced British chain JD Sports, in which cybercriminals stole a huge amount of valuable data.

Cyberbezpieczeństwo mity

At the target of hackers

Recent years have brought many challenges to business, but what currently threatens companies the most are cyber-attacks that can have a huge impact on continued operations – says Adrian Hojny, CTO at Fashion Trends Group.

It is not only industrial giants that cybercriminals are targeting, as hackers increasingly targeting smaller retailers as well. Over the past year, the percentage of business that have suffered a cyberattack has increased significantly, with significant financial and image loses.

Safe e-commerce in the cloud

Entrepreneurs that represent the e-commerce sector are aware of this risks. Uninterrupted operation of the business is crucial, among other things, commerce, in which there are cyclical periods of intense trading, such Black Friday or days leading up to Christmas. Faced with these challenges, e-commerce store owners increasingly investing in IT security and awareness raising training among company employees, especially those responsible for the first line of contact with customers.

Business is increasingly choosing to migrate systems to the secure cloud. Cloud solutions guarantee access to modern and advanced tools in the area of cybersecurity. Security as a Service and Security Operation Center service, where the IT infrastructure is monitored and any potential security incidents is detected and stopped, are also increasingly popular. Data is properly encrypted and protected from hacking attacks.

Professional data centers are characterized by stable connection and strict control of access to servers. This makes hardware much better protected and therefore resistant to attacks from cybercriminals.

Back to the news