Source |
AlienVault Blog |
Identifiant |
1785330 |
Date de publication |
2020-07-02 11:00:00 (vue: 2020-07-02 12:06:22) |
Titre |
3 Steps to better cybersecurity in touchless business solutions (Part 2 of 3) |
Texte |
This blog was written by an independent guest blogger.
Image Source
In Part 1 of this series, we covered the first step to better cybersecurity in touchless business solutions, which is to practice extra caution in cashless payment solutions.
We continue by discussing the second step to improve cybersecurity for touchless systems, which is to increase protocols for cybersecurity and data privacy.
Heighten cybersecurity and data protection protocols
Amazon launched Amazon Go in 2016, a connected grocery store that promises no lines, no check-outs, and no registers. It uses what Amazon calls a “Just Walk Out” technology that integrates computer vision, deep learning algorithms, and sensor fusion, just like the technology in self-driving cars. Shoppers can just walk into an Amazon Go store, check-in through the Amazon Go app on their phones, and shop. They can automatically check out by picking items off the shelf. The multiple sensors within the store record items the customer has taken out. The customer gets charged on their account with the store items through the app.
Video Source
In China, Jack Ma’s Alibaba has opened around 65 locations for its Hema Store that utilise robotic technology, online payment apps, and overhead conveyor belts to revolutionise shoppers’ experience. It’s a great mix of online and offline shopping, where customers physically go to a store, browse items they want to buy, and then scan products with their Alibaba app to get more product details or add the product to cart. Consumers can also choose to have the products delivered right to their homes, even within the next 30 minutes.
Xenia and Aurus also aim to put the power of the POS (point of sale) in the pocket of their guests. They offer cashierless technology that provides a seamless shopping experience in furniture retail. In its app, you will see product details, purchase history, peer reviews, and other recommended items, and other additional information useful for guests. The consumer can start a cart from home, seamlessly shift to the offline store, and end the transaction through the instant cart to “paystation” transfers.
Caper introduces self-directed check-out with their AI-powered shopping carts with image recognition and sensor fusion. These “Smart Carts” were launched in a couple of groceries in New York City in 2019. Instead of installing hardware and retrofitting the entire store, which not all businesses would be able to implement immediately, Caper works with simple software integration so shoppers can scan, pay, and go. Carts are connected to the store’s central POS system and can scan the grocery item barcode with no app download necessary. The system can |
Notes |
|
Envoyé |
Oui |
Condensat |
“just “new “smart 000 2016 2019 2021 able account accountable add addition additional advantage aim alexa algorithms alibaba alibaba’s all also amassed amazon another any app apps are armour around attacks aurus automate—such automatically avail available aws backlash baffled banking barcode befit belts better bigger blog blogger breach breaching brick browse browsing business businesses but buy buying calls can caper card cars cart carts carts” cashierless cashless caution central certain changed channels charged check china choose city collecting collection comes companies compile complete complicated comprehensive computer concept connected consumer consumers continue conveyor couple covered credential current customer customers cybersecurity data deals debit/credit deep delivered demand despite details develop devices different digital directed directly discussing distancing dominates download driving ecommerce either emerge end entire entities environment—the eroding especially even every everywhere experience experts extra fire first fleet footprint from furniture fusion future gather get gets give global going great groceries grocery growing guest guests habits hackers hacking hardware has have heighten hema hhacking highly history home homes hosted how hygiene image immediately implement improve increase independent individual industry infamous inform information installing instant instead integrates integration interact introduces invasive invest it’s item items its jack just kindle launched launching layer learning length lies like line lines list locality locations locator look ma’s major make makes malware manage map massive may measures media medium minimising minutes mix mobile modes monetise months more mortar multiple must nearly necessary needs new next normal” not now off offer offline ones online open opened operations opt other out out” outs overhead owners part passwords pay payment peer perused phones physical physically picking place platforms pocket point pos possibility potential power powered practice preferences prevent prioritise privacy product products products—prime promises promotion proper protect protected protection protocols provides providing purchase purchased put recognition recommend recommended record recorded reference regarding registers related response retail retrofitting reviews revolutionise right risk risks robotic robust routinely sale scale scan seamless seamlessly second security see self sensitive sensor sensors separate series serve services set setting shelf shift shop shopper shoppers shoppers’ shopping significant similar simple small smart social software solutions some something sort source specific start stay step steps store store’s stores strategy strengthen strictly subscriptions such sure susceptible system systems taken target technologies technology then these through time tons touchless transaction transactions transfers troubling twitch two upgrade use useful user uses using utilise verification very viable video vision walk want war wealth weapon web well what when where whether which who why will within without works world would written xenia yet york your |
Tags |
Data Breach
Malware
|
Stories |
|
Move |
|