The eCommerce Holiday Prep List
November 22, 2017

Stephen Gates
Zenedge

Share this

As the 2017 holiday shopping season gets under way, with sales expected to hit $682 billion, this year could be the first that consumers spend more online than in stores. In fact, they may spend more than half of their holiday dollars online this year. As more people flock to e-commerce sites than ever before, the potential threat to retailers from hackers increases exponentially.

Jump to Infographic Below

As the volume of online transactions rises, fraudulent purchase attempts, denial of service (DoS) attacks and detrimental bot behavior spike, leaving retailers at risk of losing thousands, or even millions, in revenue on their busiest money making days of the year and could leave their reputations in shambles. Just think back to Target and Neiman Marcus who had breaches in peak holiday season.

Due to the massive data breaches reported this year, whereby hundreds-of-millions of identities were stolen, hackers and their bot armies are positioned quite well for a lucrative holiday season. Expect significant increases in counterfeit purchasers using fraudulent credit cards. In addition, hackers and their bot armies are likely to repetitively make and cancel purchases, hold and/or consume inventory, scrape sites, steal information, and a host of other unwanted activities. Since this is the time of year when retailers experience significant increases in sales (as compared to the rest of the year), it's imperative for retailers to take these threats serious, and plan for the worst.

Hacking tools are increasingly more available, DDoS botnets made up of infected IoT are growing in size and firepower, and launching cyberattacks are getting cheaper by the minute. There are more outfits in Russia, China, and elsewhere hacking for their own financial gain, and others are readily available for hire for lower costs than seen previously. The global political landscape, domestic discontent, and heightened security concerns will likely increase consumers' online purchases vs. going to malls and other physical outlets. This holiday season will be the perfect time to for hackers to target and disrupt the shopping season, creating havoc and causing chaos. Damages and losses could very well be at an all time high.

In order to combat these behaviors, see the checklist of precautions every retailer should keep in mind to prepare ahead of the holiday rush, including running a vulnerability scan, patching all systems, ensuring DoS protection, implementing a backup plan and understanding the potential attacks and your vulnerabilities, among other preparations.


Stephen Gates is Chief Research Intelligence Analyst at Zenedge
Share this

The Latest

June 13, 2019

Establishing a digital business is top-of-mind, even more so than last year, as 91% of organizations have adopted or have plans to adopt a digital-first strategy, according to IDG Communications Digital Business Research ...

June 12, 2019

If digital transformation is to succeed at the pace enterprises demand, IT teams, the CIOs who lead them, and the boardroom must forge a far greater alignment than presently exists. That is the over-arching sentiment expressed by IT professionals in a recent survey on the state of IT infrastructure and roadblocks to digital success ...

June 11, 2019

Given the incredible amount of traffic traversing corporate WANs, it's not surprising that businesses are seeing performance issues. If anything, it's amazing applications work as well as they do ...

June 10, 2019

Are your business applications sluggish? Choppy? Prone to getting hung up or crashing at the most inopportune times? If these symptoms sound familiar, you might be suffering from the heartache of … poor application performance. Stop me if any of this sounds familiar ...

June 06, 2019
AIOps Exchange, a not-for-profit private forum defining the future of AIOps, published <span style="font-style: italic;">The AIOps Manifesto</span> discussing the role of AI in supporting digital transformation ...
June 05, 2019

As network transformation initiatives like SD-WAN, edge computing and public/private clouds are adopted at increasing rates, hybrid networks are quickly becoming the new normal for IT and NetOps professionals.Without visibility into these hybrid network environments, NetOps are unable to troubleshoot the business-critical applications every organization relies on today. Here are four ways IT and NetOps teams can gain better visibility into complex, hybrid networks ...

June 04, 2019

A minimum Internet Performance Bar exists that, if met, should deliver top-tier website performance, regardless of industry, according to the 2019 Digital Experience Performance Benchmark Report, from ThousandEyes, a comparative analysis of web, infrastructure and network performance metrics from the top 20 US digital retail, travel and media websites ...

June 03, 2019

Since digital transformation is happening at such a rapid pace based on new, highly complex technologies like multi-cloud, containers and microservice architectures, customers are experiencing more challenges than ever in managing this complexity. However, with every challenge comes an opportunity. So, how can channel partners leverage these market disruptions to open the door to opportunity? The answer is simple ...

May 30, 2019

Executives from proactive organizations reported using performance management strategies to deliver innovation and meet broader business goals, and implementing application performance management (APM) tools with advanced monitoring features such as real-time user experience monitoring, and providing a composite view of log and performance data, according to Driving Business Performance Through Application Performance Management, a new report from GigaOm ...

May 29, 2019

Through our recent study, we wanted to better understand how service desk users are interacting with the service teams; how they connect for service; the manner in which most service desks receive user requests; and if organizations employ a knowledge base and how that information might be stored. Here’s what we’ve discovered ...