top of page

5 tips for cyber resilience on Black Friday and Cyber Monday

Black Friday, 26th November, and Cyber Monday, 29th November, are key times of the year both for retailers and for cyber criminals.


The pandemic has changed the way that we shop, with more businesses than ever getting online. But by increasing your businesses visibility, you also increase the risk to your business being attacked by a cybercriminal.

Cyber criminals love retailers, with personal data and payment details that this sector is known for being key information for criminals wanting to make money.


In the last year 1 in 8 retailers faced a cyber-attack according to data published in a report by financial auditor, Grant Thornton’s.


Verzion’s 2021 Data Breach Investigations Report recorded that System Intrusion, Social Engineering and Basic Web Application Attacks represent 77% of breaches in the retail sector, but it was noted that retail also suffered from a high number of Denial of Service (DoS) attacks.

Photo showing red and black shopping bag - Photo by <a href="https://unsplash.com/@tamanna_rumee?utm_source=unsplash&utm_medium=referral&utm_content=creditCopyText">Tamanna Rumee</a> on <a href="https://unsplash.com/s/photos/shopping?utm_source=unsplash&utm_medium=referral&utm_content=creditCopyText">Unsplash</a>

Imagine this situation:

At the start of the week, you start noticing your website is slow and then fails to respond altogether. Your company has been targeted by a DoS attack. You receive a ransom demand saying that unless you pay then they will do this throughout the Black Friday and Cyber Monday period. What would you do?


In amongst this DoS noise the criminals are also trying to get malware into your system, but because of the DoS attack you don’t notice.


On Black Friday and Cyber Monday, the sale starts at 00:01hrs, just at the time that your IT support are tired, sleeping or even shopping. Even if you paid the ransom, they might still try to get the malware into your system whilst your have a higher amount of traffic, distorting your network “normal”.


Afterwards, if you have paid the ransom, be prepared for more ransom demands, you’ve paid once, why wouldn’t you pay again? And if the criminals got malware into your systems, then this would be the time that the data breach and theft will take place, now you have boosted your customer and payment database.


Businesses need to recognise that Black Monday and Cyber Monday may be ideal times, when staff are already extremely busy, for a phishing attack to be overlooked, which could be a precursor to these other attacks. An incident response plan could be a great start to thinking about what you would do if you were in this situation. The ECRC has developed a free incident response plan as a starting point for businesses. Download your free plan. Top tips to build your resilience:

  1. Use strong, unique passwords – passwords should be complex. The NCSC recommends using three random words to generate strong passwords. Take a memory (the tree fell down, smashed the fence and the dog escaped) and take three words from it EscapedSmashedTree. Add in some capital letter, symbols and numbers and you have a strong password. If you are like us at the ECRC and have too many passwords to remember. Use a password manager.

  2. Enable 2 Factor Authentication (2FA) wherever possible – strong passwords can only protect your accounts so far; the passwords could be stolen in a data breach or a phishing attack. 2FA protects your accounts further as the criminal won’t have the second piece of verification. If you want more information on 2FA watch our videos.

  3. Backup your data – if the worst happens, and criminal gains entry to your system, encrypting all of your data, you want to be sure that you can recover as quickly as possible – ideally without having to pay a criminal! Backing up your data (and testing your back ups work) can help your recovery. Backups should be automatic and offline.

  4. Update your devices and systems – criminals know about published vulnerabilities and will actively look for companies which are using those systems to exploit them. Make sure that your company isn’t part of the low hanging fruit for criminals and update your devices and software, as soon as possible after an update is released.

  5. Be aware of the phish – phishing, in all ways email, text, voice calls, is the highest attack method of cyber criminals. Successful phishing campaigns can lead to gaining access to your systems, fraud, theft and data encryption. Staff are both the weakest link and your strongest protection. Ensure that they know what they are looking for in a phish and what to do about it if they do unfortunately fall for it (it will happen) or even if they don’t. You can read all about phishing URLs in our other blog.


If you would like some help implementing this recommendations contact us today and we can put you in touch with one of our Trusted Partners who will be able to help.

Comments


The contents of this website are provided for general information only and are not intended to replace specific professional advice relevant to your situation. The intention of The Cyber Resilience Centre for the East is to encourage cyber resilience by raising issues and disseminating information on the experiences and initiatives of others. Articles on the website cannot by their nature be comprehensive and may not reflect most recent legislation, practice, or application to your circumstances. The Cyber Resilience Centre for the East provides affordable services and Trusted Partners if you need specific support. For specific questions please contact us.

The Cyber Resilience Centre for the East does not accept any responsibility for any loss which may arise from reliance on information or materials published on this document. The Cyber Resilience Centre for the East is not responsible for the content of external internet sites that link to this site or which are linked from it.

bottom of page