article thumbnail

8 Considerations for Retailers Investing in AI-powered Video Surveillance

Pure Storage

8 Considerations for Retailers Investing in AI-powered Video Surveillance by Pure Storage Blog One might think retailers started the new year feeling festive after wrapping up a robust 2023 holiday shopping season. But a concurrent trend—rising retail shrink—is eroding retailers’ profitability and feelings of good cheer.

Retail 122
article thumbnail

Cybersecurity tips for retail companies

Online Computers

Retail companies have a huge target on their back when it comes to cybercrime. That's why it's so important for retail companies to take steps to protect themselves from cyberattacks. In this blog post, we will discuss some cybersecurity tips for retail companies. Elevate your compliance profile. Audit your system.

Retail 78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Retailers Must Use SaaS Safely to Protect their Bottom Line

Solutions Review

In this feature, Zerto ‘s Global Director of Technical Product Marketing Kevin Cole offers commentary on why retailers must use SaaS safely to protect the bottom line. The retail industry is one of the largest users of business-to-business technologies like SaaS. For retailers in particular, a data breach can be extremely costly.

Retail 59
article thumbnail

Why Real-Time Encryption Detection Matters

Zerto

When Zerto came out of stealth mode in 2011, we immediately made a splash by winning VMworld’s Best of Show award and earning some great early customers—including banks, colleges, and retailers that are still partnering with us a dozen years later. The tools to fight back have been evolving right alongside the malware.

Malware 94
article thumbnail

How Security Leaders Can Better Protect Remote and Field Service Workers

everbridge

Tracy Reinhold: Digital security threats, including ransomware and malware attacks, are very, very prevalent these days. He had been recruited by the retail giant to investigate and protect company interests related to compliance and ethics concerns across its global portfolio.

Security 116
article thumbnail

Four Key Backup and Recovery Questions IT Must Ask During Deployment

Solutions Review

A solid backup system also reduces the pressure on the organization’s other security tools, providing another layer of defense if malware gets through its firewall or other security controls. Most IT professionals know they should be prioritizing DR/backup, but many don’t in practice.

Backup 105
article thumbnail

3 Essential things every business owner should know about IT security in 2023

Online Computers

Phishing attacks often involve email or text messages that appear to be from a legitimate source, such as a government agency, a bank, or an online retailer. Malware Malware refers to any malicious software designed to damage or disable a computer system, including viruses , Trojans , and spyware.

Malware 52