, Singapore

Developing end-to-end security programme for retail

Retailers must rapidly evolve online applications to meet market demands but at the same time, more shoppers are wary of the privacy threats when shopping online as a breach can be very harmful to a retail company.

Speaking to Retail Asia, Olli Jarva, managing consultant at Synopsys Singapore, explained: "Tangible costs range from stolen funds and damaged systems to regulatory fines, legal damages and financial compensation for injured parties. Even worse, it can damage the relationship and trust that the brand has built with customers and tarnish its reputation."

Moving into the new year, he opined that developing an end-to-end security programme that will reduce unauthorised or suspicious access while still maintaining a smooth process for customers makes good business sense: "Leaders in the retail industry must ensure that they have exceptional defence profiles if they want to hold on to their loyal customers—and attract new ones."

While protecting customer relationships and bottom line is no easy task, it is possible to minimise security risks by building security, understanding adversaries and then designing correct controls and gates in Secure Software Development Lifecycle (S-SDLC). Jarva recommended putting in place a measurable and scalable Software Security initiative that addresses the immediate and long-term needs of retail and e-commerce organisations:

  • Application security - when developing applications, ensure quality and security at every step of the development, testing, and procurement life cycle, rather than an afterthought.
  • Mobile application security - Assess security of iOS and Android applications and their back-end components to discover malicious or potentially risky actions in your mobile applications, keeping the business and customers secure against attacks.
  • Vendor analysis - If your organisation relies heavily on third-party software or allows third-party access to your network, make sure it meets compliance requirements and protects customer data.

“Put third-party applications under the same scrutiny as the applications you develop in-house, so you know the code you receive is secure. When your full supply chain is aligned along the same security protocols and practices, you’ll decrease risk and reduce the time and resources it takes to launch secure software,” Jarva said.

He cited Target as an example of a retailer with an intrusion into its system which can be traced back to network credentials stolen from their third-party vendor -- a refrigeration, heating and air conditioning subcontractor.

Swarovski menguasai TikTok untuk perluas skala luxury di kalangan Gen Z

Produsen Kristal asal Austria ini bekerja sama dengan influencer untuk menjangkau pasar Singapura.

Dear Me Beauty berencana membuka flagship store

Store ini dapat menjadi fondasi bagi pertumbuhan pasar yang lebih luas.

Pasar perawatan hewan peliharaan melejit di Singapura

Mereka menghabiskan uang untuk pelajaran renang, yoga hewan, pilates, dan lainnya.

Jaringan makanan cepat saji asal Cina membidik listing di Hong Kong

Mereka menggunakan kota ini sebagai tempat uji coba untuk ekspansi lebih lanjut ke luar negeri.

Turis dari Shenzhen mendorong permintaan ritel di Hong Kong

Kebijakan masuk yang lebih longgar menguntungkan sektor-sektor terkait pariwisata.

Brand Thailand beralih ke Influencer dalam membuat hype dan meningkatkan profit

Bisnis lokal berada di bawah tekanan untuk bersaing dengan Temu, Shein, dan TikTok Shop.

Lebih banyak peritel di Asia Tenggara melirik kasir self-checkout

Shopper muda dan penetrasi smartphone yang tinggi mendorong tren ini.

‘K-beauty’ menguasai dunia skincare

Produk dengan bahan alami Korea sangat diminati di Cina dan AS.