CONTACT US
info@bidaiondo.com

The influence of digital transformation on business security.

The use of new technologies and digital media to materialize new experiences in digital transformation generate greater participation and commitment of users, although they simultaneously increase the dangers of digital fraud and information violation. This is revealed by an investigation carried out by the consulting firm Baufest, which verifies how innovative retail business models put firms at increasing risk for their operation.

Digital transformation in the retail sector
With the arrival and consolidation of the digital transformation in the retail sector, it is intended to respond to the divergences in terms of consumer needs and expectations. However, the immediacy of the changes are above security controls, since the wholesale chains, by generating an expansion in their digital infrastructures that improve their user experience, are at the same time falling into a possible attack.
Generally, it is a happening event in industries, although a number of essential challenges imply that there are cybersecurity risks in retail, leading to a more alarming scenario.
From the foregoing, the following can be deduced: each sector, computer, tablet, mobile device or Wi-Fi, can be tools that make the work of digital transformation teams more complex, so computer security in firms seeks to solvents each of the attack channels. Although transactions are usually executed through digital channels, storing data in cloud environments, all retailers are exposed to cyberattacks.

Companies are obliged to establish cybersecurity strategies or policies, for which it is key to give support to correct practices among workers; Likewise, have surveillance processes that may be essential to care for and eradicate the threats that cybercrime can create. On the other hand, the so-called data lakes of retail companies are usually attractive spaces, since they are traditionally providing super-confidential identity data, such as information regarding credit cards.
Considering some statistics from Interface, 84% of the cyberattacks that are executed in the industry have social engineering, system intrusion and attacks on basic apps. On the other hand, 87% of the experienced cases are usually external and 13% tend to be internal. When it comes to compromised information, 45% is made up of credentials, 27% to personal data, 25% to payment information, and 25% to other sources.

Last news

base_url:
host: www.bidaiondo.com
REQUEST_URI: /articles/la-influencia-de-la-transformacion-digital-en-la-seguridad-del-negocio
path: /news/ai-against-ai-this-is-the-system-with-which-openai-is-trying-to-protect-its-atlas-agent-browser
AI against AI: this is the system with which OpenAI is trying to protect its Atlas agent browser.
In October, OpenAI launched Atlas, an AI-powered browser that functions as a proactive personal assistant, capable of understanding the context of the websites you visit and helping you in real time with summaries, contextual searches, and task autom...
base_url:
host: www.bidaiondo.com
REQUEST_URI: /articles/la-influencia-de-la-transformacion-digital-en-la-seguridad-del-negocio
path: /noticias/meta-compra-manus-en-una-operacion-que-superaria-los-2-000-m
Meta buys Manus in a deal that would exceed $2 billion
Meta's move is as unexpected as it is risky, revealing its concern about getting ahead in the race to achieve Artificial General Intelligence, something Manus has been boasting about since its founding in March 2025. What Meta's acquisition o...

online trading systems.

We show you the best way to market products and services online, through a professional service of installation, management and maintenance of your virtual store

We program to suit you

We help you achieve operational excellence in all your business processes, whether they are production, logistics, service or office processes. In addition, we assure you to maintain continuous improvement in your management.

Bidaiondo Articles

How to use Gemini to detect images and videos generated with Google's AI.

Advances in AI are giving works generated with this technology increasingly realistic quality, which can pose a significant challenge when distinguishing between reality and artificial content. To help users in this regard, Google has integrated into Gemini the ability to detect whether a video was edited or created using one of Google's AI tools. This feature has been rolled out in all languages ​​and countries supported by the Gemini app, i...

Ver más »

Google concludes its December core update: the third and final one of 2025

Google almost missed the deadline for its last core update of the year. The tech giant activated its major update on December 11th, along with a prediction that it would take about three weeks to complete. Had this timeframe been strictly adhered to, we would be bringing you this news on the first day of 2026, but it was ultimately rolled out in 18 days, finishing on December 29th. Through its LinkedIn account, Google explained that this core upd...

Ver más »