search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
fi ne,


reputational damage, and a potential loss of


customer confi dence. It is obvious that all employees should know how


to report violations and be familiar with the rules and procedures of the GDPR. At the same time, it must also be ensured that the software and system landscape used in the retail trade is fully supplied with the latest security patches and fi rmware updates.


IOT DEVICE INCREASE HEIGHTENS retail cyber attacks The IoT is becoming increasingly attractive to some retailers. Many companies have already started using IoT devices to track goods, for predictive equipment maintenance, customer fl ow analysis and a variety of other tasks that can now be easily automated and effi ciently executed with this technology. All these newly-networked devices are doorways


– possible entry points for cyber criminals. As the cyber security industry and regulators strive to keep pace with the proliferation of IoT devices, retailers must strike a balance between the costs and benefi ts of the increased deployment of networked devices. For example, an infrastructure outage caused by


a Distributed Denial-of-Service attack can bring an entire business to a halt. With most retailers adopting an omnichannel strategy, there is an increased threat as well as increased interaction between customer and retailer at the digital level. A company’s ability to function depends largely on the connectivity of the technologies it develops – downtime provoked by hacker attacks can cause companies huge losses.


NETWORK CAMERAS AND AUDIO SYSTEMS BOOST SECURITY The shift away from legacy CCTV and analogue equipment has revolutionised retail security. Modern technologies used for prevention and protection, such as network-enabled cameras, access control


devices, audio systems and analytics, can provide extremely valuable - as well as accurate – business and security data. However, all security vulnerabilities in these technologies represent a systemic weakness that will allow a potential attacker to gain access to the network, and thus to a retailer’s sensitive data – including valuable customer information. Another important benefi t of these systems, in addition to the obvious security applications with the ever-increasing development of IP-Surveillance cameras, is that they can also be used to collect business-critical data for business optimisation. The introduction and enforcement of the GDPR has prompted retailers to evaluate the data that is potentially collected, as well as the methods by which it is stored and used. Other departments that benefi t from this data include marketing, fi nance, logistics, human resources and visual merchandising. These


network-based solutions in the retail


industry are especially important in times of social distancing: network cameras combined with video analytics can check whether the number of people in a defi ned area exceeds the permissible level, whether distancing rules are being observed, and whether face masks are being worn. Combined with audio solutions, customer fl ows can be controlled, people can be encouraged to practice distancing or further recommendations can be made via loudspeaker. Digital occupancy information


via monitors or


traffi c light systems at entrances provide support to security staff ; they also enable customers to decide, based on live data, whether or not they should enter a store. Access control with contactless badge technologies thus reduces the number of contact points between people. Edwin Beerentemfel (pictured), Manager Business Development Middle Europe at Axis Communications.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62