Retailers must overcome business security risks online, in store and in the supply chain.
During Halloween time, I love to write seasons-themed articles on how retailers can effectively get rid of the bogeymen threatening to wreak havoc in different parts of their business. This year, I turn my attention to the looming security threats that haunt retailers all year round, not just during the spooky season.
Fortunately, there are specific solutions that retailers can use to exorcise any evil spirits that threaten their security on the web, in the store, or along the supply chain.
The days of simply relying on a secure firewall are long gone. Retailers should carefully monitor all inbound network traffic and automatically report anything suspicious (such as an IP address associated with a high-risk area) for further investigation. This includes tracking any proprietary and third-party code added to their website in real time.
Retailers should also consult with any third parties, such as online marketplaces, payment processors, or even maintenance service providers, who may provide entry points to their network. Make sure that any entity that has a legitimate reason to gain access to any part of your business is aware of hacking threats and is actively taking preventative action.
Additionally, two-factor authentication can help mitigate the damage caused by stolen and misused passwords. In addition to investing in technologies that prevent and block threat actors, retailers must deploy solutions capable of detecting hackers once they are inside the network, as well as analyzing the dark web. to detect any sign of illegal distribution of their customers’ information.
Store level crime
Shoplifting no longer means bored teens grab a few impulsive items near the cash register and run out. Organized crime groups have turned shoplifting into a major illegal business, to the point where retailers are even reducing store hours or completely closing stores in high-flying cities like San Francisco..
One of the tools available to retailers to tackle store-level crime is advanced network camera technology. For example, based in Salt Lake City regional furniture chain RC Willey uses Axis surveillance cameras, thermal cameras and security radars to provide 24/7 surveillance coverage. The retailer also integrated Axis Perimeter Defender analysis and network horn speakers to detect intruders and broadcast messages.
In addition, RC Willey uses Axis 3D People Counter and Store Reporter solutions to track customer flow and report other business information. The company also operates Axis Camera Station to monitor video and uses the Axis Device Manager dashboard to remotely manage and monitor all networked security devices.
Retail inventory in transit is a prime target for criminals, who are often aided by accomplices working for a retailer. Products can be stolen from trucks, warehouses and distribution centers, or warehouses. However, retailers have a range of tracking and tracing technologies that can quickly alert them to missing inventory, as well as notify them of its location.
âYou don’t hear about hijacked trucks anymore like you did in the 1970s and 1980s,â said John Pennisi, a former member of the New York-based Lucchese Mafia family. Chain store age in an exclusive interview. âNow you have technologies like GPS. ”
Besides, virtually every item in the retail supply chain is equipped with its own traceable identifier – a UPC barcode. Capturing barcode data allows retailers to accurately locate and authenticate individual items at any point in the supply chain, in real time. And barcode data can be easily read with affordable software loaded on virtually any mobile device.
And retailers in certain industries (like apparel) may find that 50% or more of their inventory is equipped with RFID tags. This dramatically increases the potential ROI of implementing RFID readers to facilitate real-time product tracking and traceability.