Retail Leads the Way in Data Breaches. So What Can Companies Do to Stop It?
Even the strongest retail players are at risk: With massive amounts of customer information being stored across multiple channels, combined with limited IT resources, the task of successfully defending their networks from vulnerabilities is daunting to say the least.
September 24, 2018 at 05:00 AM
9 minute read
|
This article appeared in Cybersecurity Law & Strategy, an ALM publication for privacy and security professionals, Chief Information Security Officers, Chief Information Officers, Chief Technology Officers, Corporate Counsel, Internet and Tech Practitioners, In-House Counsel. Visit the website to learn more.
If 2017 was considered the “year of the data breach” as the number of incidents hit a new record high of 1,579, 2018 might get even more serious. Just a little more than halfway through 2018, the number and scale of data breaches that have already been reported is staggering. To name a few, In March, Under Armour announced that a breach affected an estimated 150 million users of its food and nutrition application; In April, Facebook notified 87 million members of its platform that their data had been shared; and in June, EXACTIS leaked a personal info database with 340 million records.
|Macy's Data Breach
In the latest breach to make headlines, mega department store Macy's fell victim, as revealed in an emailed letter sent by the company to its affected customers confirming that an unauthorized third party accessed online customer accounts between April 26 and June 12 this year. Macy's also sent a letter to the New Hampshire Attorney General's Office on July 2 to notify them that 753 New Hampshire residents were affected by the breach, which detailed that it was alerted to an influx in abnormal login activities on macys.com and bloomingdales.com (owned by Macy's, Inc.) by their security suite on June 11. The leaked info may include customers' names, addresses, phone numbers, email addresses, birthdays, and credit and debit card numbers with expiration dates.
|The Retail Industry Is the Most Compromised Sector for a Fifth Year in a Row
Macy's isn't the only retailer to make headlines this year because of leaked data — the list is long and includes: Orbitz, Under Armour, Best Buy, Delta Air, Kmart, Lord & Taylor, Panera Bread, Saks Fifth Avenue and Saks Off 5th, and Sears. In fact, Trustwave's Global Security Report found that the retail industry was the most compromised sector for a fifth year in a row, and the primary target is payment card data.
These attacks aren't random, and there are plenty of reasons that hackers go after retailers. Even the strongest retail players are at risk: with massive amounts of customer information being stored across multiple channels, combined with limited IT resources (and sometimes a hodgepodge of new and old systems and hardware — or just fully antiquated systems altogether), the task of successfully defending their networks from vulnerabilities is daunting to say the least. Other reasons that retailers are at risk include:
- Retailers are continuously processing large volumes of payment data, which translates to easy payouts for hackers if they can get into the system. Payment data is most commonly stolen through point-of-sale (POS) breaches, which make up 64% of all incidents, and a magnetic stripe data attack was the second highest at 33%. Because hackers have found ways to access the card data before it gets encrypted into the POS system's memory, retailers that use POS machines need to provide end-to-end encryption for all credit card transactions in order to protect customer data.
- The technology that makes “tap to pay” or “mobile wallets” possible (called Near Field Communication) is a huge convenience for customers, but also poses its own security risks, as businesses aren't able to control who is accessing their system. For example, if a customer's phone is hacked, and they use Apple Pay, or any other mobile wallet, a virus could be introduced into the retailer's network. As more and more people begin to utilize mobile payment, we will likely see this technique used more often by hackers.
- In this day and age, retailers must utilize a multi-channel strategy to remain competitive. The downside to this is that it makes data security a bit more challenging in that customer information is spread out across multiple channels.
- The retail industry is known for having high turnover rates, and perhaps because of this, there's often a lack of internal security education. Particularly during busy seasons (e., holidays), many stores rely on hiring temporary employees who may not go through as stringent of background checks. This means that some of these workers may be more likely to have a criminal background, which could put the business at a greater risk.
- Hackers are also very well aware of when retailers' peak business periods will be, so it's easy to use blackmail as a threat during these times. Additionally, because companies worry about their systems breaking during peak traffic, they avoid changing the code for their websites and mobile apps. This leaves stores' systems — and all the data they hold — particularly vulnerable.
- Generally, we often don't see cybersecurity as a central focus among retailers. The spotlight is often on revenues, with data security sometimes seen as an afterthought. And hackers know this.
Cybersecurity Professionals in the Retail Industry Need to Do More
The increasing normalcy of data breaches in the retail industry has highlighted the fact that retailers need to be doing more — particularly in terms of protecting customer data. This must start from the inside out. Data security and compliance must crosscut the entire organization. Leaving this significant task just to IT or another dedicated department fails to address the larger issue: all staff are stakeholders in a company's data protection, and therefore must be trained on security best practices and requirements on an ongoing basis.
Indeed, the most common (and easiest) way for hackers to access and steal sensitive information is through spear phishing: a form of phishing in which a hacker attempts to target one or more individuals using finely-tuned, personalized tactics to trick users into breaking security procedures. As one of the most successful forms of phishing on the Internet today, over 90% of all cyberattacks are successfully executed with information stolen from employees who unwittingly give away their system ID and access credentials to hackers. For the most part, this is behavior that can be rectified with more training and vigilance, which is why education of all employees is so important.
Retailers that make cybersecurity a top priority will reflect that in all aspects of their business. Ultimately, it should be a part of the company culture and, as such, echoed in all procedures and policies. This should also extend to vendor relationships, as information theft can also happen unknowingly through vendors or third parties that companies transfer information to. If these third parties don't have the same security standards as the organization, it's important to find one that does.
The truth is, however, no matter how stringent and robust a retailer's security mechanisms are, there is nothing it can do to make its organization 100% immune to a security incident. Therefore, because retailers can have the latest and greatest of security measures in place, and there will still always be cyber threats present, offering identity protection to their customers (and their employees) is just one more precaution to help safeguard their information. In general, there are already so many other gateways to identity theft (and the resulting fraud), that having comprehensive identity protection just makes sense.
|Prevention is Key, but Only Half the Battle
Following any high-profile data breach, everyone should take measures to stay safe and secure on and offline. They should monitor all activities on their financial and credit card accounts, credit data, lock down their login information by using two-factor authentication, review any information from their insurance companies and/or explanation of benefits, and sign up for an identity protection service that includes identity and credit monitoring and resolution services — even better if this service is in place before being affected by a breach.
Comprehensive monitoring services should include Internet surveillance, compromised credential monitoring, and credit data monitoring. The monitoring should also include alerts so that if a customer's information is detected on the dark web, they can quickly assess and work with resolution experts to minimize the impact.
Monitoring and prevention are key, however, in today's digitally connected world, the ubiquity of data has made prevention only half the battle. The reality is, no matter how comprehensive the monitoring is, there is always a chance that your identity gets stolen. Identity theft happens when criminals use stolen data to apply for loans, obtain credit, or commit fraud. While the rise in data breaches hasn't been proven to have directly caused the rise in identity theft, the correlation in statistics' rise certainly indicates a trend.
Identity fraud resolution is time consuming and stressful, and victims can very easily spend hundreds of hours trying to resolve their issue. Research shows that on average, it takes a victim of identity theft anywhere from 7 to 40+ hours to resolve their case. For this reason, it is critical for companies to take preventative steps to help mitigate the fall-out if they do fall victim to identity theft.
Furthermore, it is important for victims to have access to dedicated experts who can help resolve this major issue, with compassion and patience. According to the newly-released ITAP Report 2018 sponsored in part by Generali Global Assistance, emotional distress is by far the most common type of loss when faced with an identity theft issue, applying to 75% of all incidents (financial loss is the next most common, at 54%).
A full-service identity theft and fraud resolution provides compassionate care and attention to customers who are often stressed and unsure what next steps to take, which would help not only lessen the impact to people affected, but also hopefully lessen any negative impacts on customer retention for the company, should a breach be the cause of the fraud. Offering to help customers in their hour of need can help build loyalty between a company and its customers.
If your organization already has an identity theft resolution service in place for customers, they will already be more knowledgeable than the average person in dealing with a data breach — and importantly, much better protected when it comes to dealing with the aftermath of one. And in today's world, there's immeasurable value in that.
Paige Schaffer is president and COO of Generali Global Assistance's Identity and Digital Protection Services Global Unit.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250