search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
TECHNOLOGY


‘Tis the season to review your cyber security


By Steven Lane (pictured), Managing Director at cyber security specialist Cyberwolf Consulting


Seventy two per cent of large British businesses have suffered a cyberattack this year - but it’s the retail industry that’s most at risk. I’ve worked with some big


names on the high street to help improve their security and Cyberwolf staff are currently working with a well-known retailer. These experiences have brought home just how at risk the sector is. Typically, retailer websites can be


easily exploited. Not enough focus is put on keeping customer data safe from hackers, either. So patchy are some retailer sites that cybercriminals have been known to skim credit card data as customers pay, in real-time, without either the customer or the company noticing. Retail cyber risks peak during


the Christmas period. Why? Two words: online shopping. 2018 has been a bumper year for


online retail, with sales rising 15.3% year-on-year. The more customers


shop online, the more personal information they share with retailers in online accounts. Threats include en


masse customer account takeovers, where hackers use automated ‘bots’ to fire waves of login credentials at retailer accounts until they unlock. ‘BOPIS’ fraud - otherwise known


as Buy Online, Pickup In Store scams - involve fraudsters paying for goods using stolen credit card details, then pick them up in-store, where all that’s required is a confirmation email. It’s so simple to fix: verifying a purchase credit card at the point of collection would curtail BOPIS rates hugely. Retailers should consider identity


verification solutions that analyse real-time customer behaviours and signal issues. These solutions use AI to analyse data, similar to those used by banks.


‘So patchy are some retailer sites that cybercriminals have been known to skim credit card data as customers pay, in real-time’


Seventy five per


cent of cybersecurity incidents are caused by


the accidental actions of staff.


A single employee opening a dodgy email, or clicking a link that allows malware to infect a network, can compromise an entire company. Businesses need regular training


to help staff recognise cyber threats, especially over Christmas, when a common cyberattack trick is to lure users into clicking on links related to seasonal silliness. That singing elf e-card supposedly from a colleague? Think twice before opening - it could suspend your company’s ecommerce systems and stop you trading. Hackers have become


increasingly adept at mimicking email addresses that seem genuine. A global email security standard exists to tackle this threat, known as DMARC (domain-based message authentication, reporting and


How technology can bring a workplace into the future


Derby-based Scenariio Intelligent Infrastructures on the benefits of utilising smart lighting technology.


Like everything, buildings are becoming smart and businesses are using their buildings’ data to make strategic decisions; integrating rich sensor networks and installing smart lighting systems that provide a range of benefits. Scenariio, which is celebrating its


fifth and best year of trading, integrates the latest technology in the workplace, making buildings smarter, greener and more efficient; creating a better environment for staff. Its smart lighting runs over low


voltage data cables replacing traditional electrical cables. The


innovative system allows for the control and analysis of lighting, security, temperature levels, occupancy and energy consumption. The sensor network collates real-time data, 24/7, and sends it directly to an online system to be controlled securely from any computer. Scenariio installs systems


whereby one sensor is operated on individual cables which have a multitude of purposes. Sensors can be installed in places where a camera wouldn’t be appropriate but lighting and controls are required. A sensor would detect if


someone was hiding or using it as a route to break-in to a building, an alarm could be triggered and false alarms quickly identified. A key benefit is its human-centric capability; where lighting levels shift dependent on available daylight that the sensor detects. This enhances mood and wellbeing for workers, including improving sickness levels. Each light has its own sensor and will dim or brighten according to its own measurements. The system is environmentally


friendly and energy savings will be made throughout the year, especially summer.


Cyber threats could ruin your Christmas


conformance). Yet just 2.1% of top retailers have adopted it. All this is bad news for retailers


now that GDPR legislation is in force. Many businesses are still playing catch up and that’s risky. We could see some of the largest fines in history for data breaches next year, if companies don’t act now. Cyberwolf recommendations for


the retail sector are to focus on the basics, and do them well. First: accept that every business is now a target, so being able to detect and react to threats quickly is vital. Have well-rehearsed incident


response plans. Remind staff about the danger posed by email and be prepared to run simulations. A cybersecurity culture comes


from the board: if retail bosses set the right tone, they can expect a happy, successful Christmas. After all, that’s what


cybersecurity is: an enabler for safe business and healthy profit returns.


The smart building's capacity is


going to broaden. The systems Scenariio install are ready for the next generation of intelligent infrastructure, which will provide further advancements to support strategic decisions.


business network December 2018/January 2019 75


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84