How to Turn Returns into Repeat Customers

It all starts with having a clear return policy and training your employees on making those customer connections during difficult moments. If your return policy wasn’t easily visible when your customers made their purchase, it’s you that dropped the ball on communicating your expectations. Be prepared to apologize and accommodate your customers whenever possible; then, make sure your return policy is prominently visible on your receipts, cash wrap and website for future customers.

Read the source article at ASD Insider

Data Protection Day, But Why Is The 15th February Even More Important For Businesses?

Last year saw some of the worst data breaches. 14 million Verizon subscribers who contacted its customer services and had their records exposed; the “best cyber security consultant in the world”, Deloitte; Forever 21’s compromised PoS devices; and lest we forget the infamous Equifax. Is there really any hope for 2018? Data Protection Day is very timely indeed. It comes just four months before GDPR comes into effect.

Read the source article at home – Information Security Buzz

Six Key Business Tips for Online Companies

Good organizational skills are hugely important for the maintenance of any business but particularly for online ventures because your web assets could number in the dozens. Your web assets include your entire online presence so this means your social media profiles, an actual website, email accounts, and your hosting account. It is crucial to ensure that all are up-to-date and well managed because these are often the direct link between you and your customers.

Read the source article at

Six Ways that Distribution Centers Can Reduce Packaging Waste

Packaging waste is a crucial issue regarding both businesses and consumers as their packaging waste accounts for roughly 40% of all solid waste. According to the US EPA, residential, commercial, and institutional users tend to generate more than 75 million tons of container and packaging waste annually, but only half of this waste is recycled completely whereas the other 37 million tons end up in a landfill.

Read the source article at Parcel Industry

An Examination of the Security Threats Posed to a Mobile Wallet Infrastructure

Our last article reviewed in depth just what precisely a Mobile Wallet is, and how it works. In summary, it is essentially a mobile app from which you can download from either the App Store or Google Play. Once it has been installed onto your wireless device, you enter in your credit card information, and the next time you are at a local store, you can pay for your products by just tapping your Smartphone onto the Point of Sale Terminal.

Read the source article at InfoSec Resources

New Year, New Goals: 5 Tips to Make 2018 Your Best (Retail) Year Yet

Keeping this in mind, consider how the below 5 tips can help you kick start the New Year right and strengthen your retail efforts to make 2018 your best year yet. Mastercard SpendingPulse recently released numbers which showed that sales grew 4.9 percent over the 2017 holiday season. Know what this means? It means no more blaming the “retail apocalypse” for low sales numbers. It also means no more blaming the category you sell in, either.

Read the source article at ASD Insider

3 Ways to Jumpstart Your Retail Sales

2017 opened on an optimistic note for retailers, with Moody’s forecasting core retail sales increase of 5.4 percent, up from 4.2 percent in 2016. Analysts anticipated that higher employment and wages would drive higher sales. The preliminary results from the holiday shopping season are bearing this out so far, with Cyber Monday posting a 16.8 percent increase from 2016, making for the biggest online shopping day in history to date. Holiday shopping is on track to reach the $100 billion mark.

Read the source article at

LockPoS malware adopts injection technique to evade detection

LockPoS, a point-of-sale malware program discovered in 2017 stealing payment card data from computers’ memory, is now using a new malware injection technique designed to bypass antivirus hooks and evade detection. Hod Gabriel, malware analyst at Cyberbit, reported in a company blog post last week that LockPoS uses three main routines – all of which are exported from ntdll.dll, a core Windows dynamic link library file – in order to inject malicious code into a remote process.

Read the source article at Cybersecurity News and Product Reviews

Forever 21 Breach Lasted Over Seven Months

Encryption was not turned on at some of the point of sale (POS) devices used in Forever 21 stores, exposing customers card data to info-stealing malware last year, the firm has revealed. In an update to November revelations of a major data breach, the fashion retailer claimed that an investigation had found signs of “unauthorized network access and installation of malware on some POS devices designed to search for payment card data.” “The malware searched only for track data read from a payment card as it was being routed through the POS device,” it added. “In most instances, the malware …

Read the source article at Infosecurity Magazine