Page 30 - GS181001
P. 30

CoverStory




        Cory Capoccia, president at Womply, said CRMs can auto-  trusted payment methods, they advised. Security analysts
        mate marketing campaigns ahead of the holidays, which   recommend these additional precautions:
        frees merchants to focus on immediate priorities. "With a   •  Implement point-to-point encryption (P2PE): Rus-
        CRM in place, you're better prepared to communicate with      ton Miles, co-founder and chief strategy officer at
        customers, and get them to come back, in the event that       Bluefin Payment Systems LLC, has helped proces-
        inclement weather, inventory problems or other issues         sors,  manufacturers  and  leading  retailers derive
        prevent you from delivering a great customer experience."     multiple benefits by implementing point-to-point
        Leverage big data                                             encryption.  "By  upgrading  your  terminals,  you're
                                                                      giving merchants the gift of increased sales, time
        Last year's lessons are integral to holiday planning, noted   and convenience," he stated. "You're also taking an
        BigCommerce analysts, who contend that "learning from         opportunity to make it a very sad Christmas for
        your actions and formulating data-based insights is the       hackers."
        only way to enter the next holiday season wiser and more      "Merchants that have an option from their acquir-
        prepared than the previous." Following are suggestions on     ers to do point-to-point encryption (P2PE) should
        how to leverage data-rich merchant portfolios and CRM         strongly look at implementing those options," said
        systems.  Capoccia said analytics deliver actionable advice   Mark Carl, CEO at ControlScan. "Encrypting card
        to help merchants make informed decisions. "For example,      data at the point of interaction (POI) continues to be
        if Black Friday was your best sales day in 2017, you might    the most successful means of preventing a breach of
        choose to open earlier this year to capture spillover traffic   card data itself."
        from doorbuster shoppers at Best Buy and Target," he said.
        "Without access to this data or an easy way to sort through   •  Isolate, segment critical infrastructure: Carl ad-
        it, business owners miss out on repeat business because       vised merchants to isolate and segment POS envi-
        they don't understand their customers."                       ronments from other more vulnerable systems and
                                                                      monitor all systems in real time to protect from in-
        Data-driven insights can help merchants audit their on-       trusions.
        line reputations, a critical imperative in today's always-on,   •  Schedule routine penetration testing:  "Regular
        always-connected economy. Capoccia recommends com-            and ongoing penetration testing is one component
        bining artificial intelligence with human oversight for best   of a mature security program and can help identify
        results. CRMs can identify negative reviews and respond       vulnerabilities that were missed by systems manag-
        in real time; merchants might also ask their best custom-     ers during changes and upgrades," Carl stated.
        ers to provide feedback, he stated. "In all cases, small mer-  •  Consider managed services: "Third-party security
        chants should be running a proactive reputation manage-
        ment program to engage with prospects and customers           consultants and service providers can validate that
                                                                      necessary controls are in place to protect the com-
        online," he said. "Online review sites are often the first
        touchpoint consumers have with a business; it's critical to   plete environment or provide services that mer-
                                                                      chants may not have the expertise or personnel to
        maintain a positive online presence."
                                                                      tackle themselves," Carl said.
        Madelyn Newman, director of product and customer           •  Implement PCI tools: Christopher Skarda, security
        marketing at CallRail, said, "Today's consumers are more      analyst at SecurityMetrics, said the Payment Card
        mobile than ever and increasingly transact from smart-        Industry Data Security Standard provides tools to
        phones. We pinpoint where phone calls originate, the web      enhance security systems. These tools include in-
        page a caller was visiting and what marketing resources       trusion detection systems/intrusion prevention sys-
        are driving the call."                                        tems, internal and external vulnerability scanning
                                                                      solutions, file integrity monitoring solutions, log
        The ability to extract source data from a smartphone          monitoring tools, and web application firewalls, he
        URL and alert agents about an incoming call facilitates       stated. "It is important to keep automated tools con-
        meaningful discussions, Newman noted. Built-in report-        tinuously tuned and monitored closely by human
        ing tools can identify the busiest times of a day or week.    experts for them to perform effectively," he said.
        "If you're managing a call center and your Black Friday    •  Continuously monitor: Troy Hovorka, forensic ana-
        call volumes more than double year-over-year, you want        lyst at SecurityMetrics, said testing infrastructure is
        to make sure you're armed with enough agents to handle        an ongoing process that is never completed. "Load
        those calls," she said.                                       testing, along with its big brother, stress testing,

        Reinforce security                                            should be a regular part of any network or database
                                                                      administrators job description, and it is no less im-
        BigCommerce researchers devoted a  section  of  holiday       portant for programmers and QA engineers relative
        planning to "technical site planning,"  counseling mer-       to the scaling capabilities of an application or web-
        chants to prepare networks and servers for increased          site under development," he said. "Yes, it will cer-
        transaction flows. Keep a clean house by maintaining          tainly take additional resources and capital up front,
        clean websites, testing third-party integrations and using    but if you experience five minutes of downtime dur-
        30
   25   26   27   28   29   30   31   32   33   34   35