article thumbnail

The Countdown to Black Friday Has Begun. Are Retailers and Consumers Ready?

Thales Cloud Protection & Licensing

So before the shopping frenzy begins, we thought this would be an opportune time to outline some best practices that both retailers and consumers should follow in order to protect consumer data. As convenience technologies evolve, look for more risks to consumers and retailers. Protecting Consumer Data is Priority #1. Back to basics.

Retail 70
article thumbnail

Ransom Gangs Emailing Victim Customers for Leverage

Krebs on Security

” The message above was sent to a customer of RaceTrac Petroleum , an Atlanta company that operates more than 650 retail gasoline convenience stores in 12 southeastern states.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone

The Last Watchdog

The tech titans have swelled into multi-billion dollar behemoths by myopically focusing on delivering targeted online advertising, in support of online retailing. Cybercriminals have begun escalating their efforts to bend the legitimate online advertising and retailing fulfillment ecosystem to their whims.

Retail 115
article thumbnail

Data Breaches and Cyber Attacks Quarterly Review: Q1 2023

IT Governance

Ransomware soared in popularity at the end of the last decade, with a relatively simple method: attackers would infect organisations’ systems with malware that would worm through their systems encrypting data. With these attacks, the criminal hackers don’t simply encrypt organisations’ systems and demand money for the safe return of the data.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

In an environment where a heating and ventilation subcontractor can pose an existential risk to a billion dollar retail chain – as infamously happened to Target – just knowing where to start assessing third party risk can be a challenge for any organization, Jordan told me. “We do white papers and thought leadership at conferences.

Risk 120
article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

Think: an online retailer that stores customers’ email addresses to send order updates. Each EEA state sets its own definition of “child” under the GDPR. Companies must be prepared to comply with these varying definitions. The EEA includes all 27 EU member states plus Iceland, Liechtenstein, and Norway.

GDPR 80
article thumbnail

Sailing the cyber security waves

IT Governance

This could include: Staff training ; Limiting user privileges; Keeping systems up to date; Implementing encryption methodologies; and. A life on the ocean wave is definitely not for the faint-hearted, and organisations must prepare to face the challenges head on. Using third-party ransomware protection. More information.