| |May 20219something they'll "think about later." Security just isn't a consideration for mobile version 1.0.54percent of restaurants who cut security corners say it was for convenience sake. Studies show that layering on security after deployment often has the opposite outcome. 68percent of organizations who don't secure digital transformation experience a costly cybersecurity exploit, per Ponemon Institute.Restaurants are waiting until they're bit by hackers to think about mobile security. The majority of operators who got hacked last year turned up the dial on mobile security spend, per the MSI. Treating security as a breach bandaid is far from cost-effective. Luckily, the issue is totally avoidable.IT'S SUPER EXPENSIVE TO PUT SECURITY IN SECOND PLACERestaurant brands that suffer a data breach can lose as much as 30percent in brand value. 80-90percent of your customers will choose to dine elsewhere after a data breach hits the news. You'll also struggle to attract and retain new customers. The majority of Americans consider a brand's reputation for cybersecurity before they purchase or sign up for anything.Recovery after a mobile security incident isn't cheap or quick. One huge, consumer-facing brand is still struggling to regain customer trust and profits 6 years post-breach. Diners care deeply about data privacy. They'll defect regardless of what kind of personal data you lose, including loyalty program or gift card hacks. Loyalty program hacking has become a $1 billion dollar industry, according to the New York Times. Disclosing a data breach is required by law, and it's going to get noticed by diners.THE PROBLEM WITH POS SYSTEM SOLUTIONSSaaS platforms for integrated restaurant POS are fast and simple to deploy. They're sold as secure because they offer built-in data encryption and cloud security updates. Big-name restaurant solutions are an all-in-one answer to customer apps, tabletop kiosks and staff mobility.It's appealing to outsource mobile security to a cloud vendor, and many believe it means the IT team is just responsible for device and network configurations Restaurant managers with minimal tech experience can download apps to devices in less than one hour.However, cloud restaurant solutions mean you're cutting a lot of corners when it comes to security. Integrated mobile restaurant POS don't account for hardware or device settings. The problem is that you're still vulnerable on many levels to device tampering, malware, and other vulnerabilities.Mobile restaurant POS don't lock down devices to prevent staff from using tablets to access WeChat or TikTok during slow times. These devices are vulnerable to malware-laden apps downloaded outside official play stores. A single infected device can quickly infect every "secure" device on the network.Integrated mobile POS lacks key capabilities to cover the basics with policies for PIN security, password policy, or whole-disk encryption. Restaurants need mobile threat detection (MTD) and response capabilities.DEVICE CYBERSECURITY FOR RESTAURANTSSecurity doesn't need to be a barrier to digital transformation. Security by design is now a regulatory requirement for many restaurant chains. It's also much cheaper than the alternative of waiting to get breached and using security as a bandaid. The solution is to build security into your initial requirements, harden devices, and take a platform approach to dedicated device orchestration.BUILD SECURITY INTO REQUIREMENTSSecuring mobile rollout 1.0 or 2.0 means creating better security requirements for hardware, software, and platform vendors. Mobile security demands a multi-layered approach to securing devices from the hardware and firmware level on up. When you're working with vendors, take a specific look at their approach to authentication, encryption, and patching. Make sure you can secure devices in real-time and respond to risks across the entire device ecosystem. HARDEN DEVICESDevice hardware needs to be tamper-proof across employee devices, kiosks, and digital signage. Mobile devices should be secure against a variety of risks that include installing malware via juice jacking, sim tampering, and theft. Device theft is unavoidable, but it's actually a much bigger deal than replacement costs. Restaurants need to know immediately when a device leaves the premises with geofencing capabilities. Real-time detection to isolate and wipe a device remotely can protect your data before a stolen device is sold on eBay. CHOOSE A PLATFORM FOR VISIBILITY AND RESPONSEMobile device management should make it easy to monitor and manage all your dedicated devices from a single location. An IoT platform can mitigate attacks by providing visibility into every layer of mobile threats. Platforms offer remote provisioning at scale across hundreds or thousands of restaurant locations. Brands need to make it easy to protect restaurant mobile devices from risks of device tampering, unauthorized apps and other misuse.A device orchestration platform creates a unified approach to cybersecurity management. By providing total visibility throughout the device lifecycle and the ability to take real-time action in response to emerging risks. These devices are key to the restaurant customer and employee experience, but they don't need to expose your data.
<
Page 8 |
Page 10 >