Hardware Retailing

SEP 2016

Hardware Retailing magazine is the pre-eminent how-to management magazine for small business owners and managers in the home improvement retailing industry.

Issue link: http://www.hardwareretailingarchive.com/i/717393

Contents of this Issue

Navigation

Page 74 of 106

HARDWARE RETAILING | September 2016 70 These data thieves can use methods such as hacking, sending malware via email or data skimming from devices physically attached to credit card readers. Hardware Retailing spoke with experts from organizations that work with retailers to guard against data theft. Our goal is to provide you with information on the risks you face and practical steps you can take to protect your customers and company. These experts include Tom Litchford, vice president of retail technologies for the National Retail Federation; Donna Embry, chief payments adviser for the payment processing company Payment Alliance International; and Donald Smith, director of the office of entrepreneurship education at the U.S. Small Business Administration. Visit TheRedT.com/data-security-qa to read online- only Q&As with Scott Reynolds, CEO of Member Insurance, and James C. Trainor, assistant director of the FBI Cyber Division, on ways to help businesses recover from cybercrimes. For additional resources on securing your business' data, visit TheRedT.com/security-resources. Cybercrime: Illegal activity done electronically. Cybersecurity: Measures, such as use of protective software, taken to protect data that is stored electronically on computers or networks. Cyber Risks: The dangers of damage to a person, business or other organization due to cybercrime. Cyber Threats: Potential electronic attacks and intrusions. Data Breach: Unauthorized access to information kept on computer hardware, software, websites and in other digital storage. P2P Encryption: The conversion of sensitive data into code to store the information in a format that cannot be decoded easily by criminals. Firewall: Software created to prevent unauthorized users from accessing or damaging computer systems. Hacker: A person who invades computer systems and networks in order to steal information or cause other harm. Malware: Malicious software, such as computer viruses, designed to impede the way a computer works or to access sensitive information. Phishing: Data stealing that is often done via emails made to look like they come from legitimate people or companies. The emails solicit private information, such as credit card and social security numbers. Ransomware: Malware that allows cybercriminals to access an operating system and block authorized users from using the information stored in that system. Criminals then threaten to delete the data unless they are given money in exchange for releasing the information back to the owners. Skimming: Attaching a device to a physical credit card reader to capture payment card information from consumers at the point of sale. Threat Surface: Areas vulnerable to exposure, such as credit card and social security numbers. Tokenization: Replacing credit card numbers in a computer system with meaningless letters or numbers. Glossary of Terms Tom Litchford National Retail Federation Litchford has more than 30 years of experience in systems engineering, sales, product management and marketing of technology business solutions. Donna Embry Payment Alliance International Donna Embry has 50 years of experience in the payments industry and currently serves in a Strategic Development capacity for Payment Alliance International. Donald Smith U.S. Small Business Administration Smith is responsible for the development and dissemination of entrepreneurial information, education, resources and tools to help U.S. small businesses succeed.

Articles in this issue

Links on this page

Archives of this issue

view archives of Hardware Retailing - SEP 2016