A few weeks ago, I asked the question “Is It High Noon in the Retail Industry?” Profits are shaky; stores are closing. Some of the biggest names in the history of US retailing are struggling to stay alive. Well, the news isn’t getting any better, at least for department stores.
About the Author
Articles by Bill Turner, LPC
Virtually everyone is using mobile apps nowadays, and the use of social media is at an all-time high. Data security and privacy have become major issues, and every user needs to know how to protect themselves. In a recent article, we discussed data protection methods to minimize your online footprint.
Crisis incidents can occur in business at any time. In the not too distant past, only the most serious incidents received major coverage by the news media. Not anymore. The proliferation of smartphone cameras and social media has changed the game forever.
April 2017 turned out to be a tough public
On Election Day in California, November 14, 2014, a crowd gathered outside a courthouse wearing fake handcuffs and carrying signs saying “End Mass Incarceration.” On that day, California passed Proposition 47, which would reduce punishment for more than one million people.
Passing by a 60 percent to 40 percent margin, the
Radio frequency identification (RFID) skimming is a form of digital theft which enables information from RFID-equipped credit cards to be read and duplicated. It can be used as a form of wireless identity theft or credit card theft. Typically, it involves the illegitimate reading of RFID-enabled credit cards (or other
Many articles in the LPM Insider talk about EMV chip technology in credit cards and how this technology fights credit card fraud. While it’s true that the chips make it much more difficult for fraudsters to create counterfeit credit cards, has the technology caused a major decline in credit card
While effective in driving sales, gift cards have also caused fraud headaches for retailers for years. Gift card fraud can range from physical theft to gift card cloning to exploiting errors on the merchant side. One newer gift card scam involves gift card cloning.
To clone a gift card, thieves steal
Thieves and fraudsters continue to invent new scams that threaten retail supply chains, even when organizations are following supply-chain security best practices. Security firm Check Point, for example, recently reported on a discovery of malware, adnets, spyware and even ransomware that had been installed on at least 36 Android devices
Any loss prevention professional who has worked is a store that sells apparel is probably familiar with customers shoplifting in fitting rooms. But how much do you know about changing shoplifting laws, current practices to control it, public opinion, and future technologies when it comes to fitting rooms?
Records are not
Data security is a subject that only the government and business need to worry about, right? Wrong! Yes, corporate data security is very big business with a spend of $82 billion in 2017 and growing, and major data breaches can be devastating. But data security needs to be personal, too.