News & Insights
Revealing Retail’s Digital Weak Points
Earlier this month, British retail mainstay, Marks & Spencer, made headlines for all the wrong reasons.
A retail cyber security incident affecting its online infrastructure exposed the personal details of loyalty scheme customers, which prompted a swift public apology and a flurry of concern from customers and analysts alike.
While it’s commendable how quickly M&S acted to contain the damage, the event, nevertheless, served as a stark reminder that even the most established and trusted names in retail are not immune to the growing threat of cyber-attacks and the need for robust cyber security.
The breach, which reportedly compromised customer names, email addresses and purchase history, didn’t expose financial data, thankfully. However, I’m sure customers are still left shaken in the knowledge that the digital platforms they rely on for purchases and engagement may not be safe. In truth, this issue could deeply undermine brand trust and consumer confidence.
A wake up call for retailers
Cyber-attacks on the retail sector are nothing new. Sadly, just days ago, both Harrods, and Co-op become the third and fourth UK retailers to be targeted by cyber criminals in just two weeks – more proof that the sector is increasingly and aggressively targeted.
Retailers are particularly attractive to hackers due to the amount of personal and financial data they hold, as well as the relatively fragmented nature of their IT environments (often a patchwork of legacy systems, third-party integrations, and rapidly scaled e-commerce platforms).
I believe that the M&S, Co-op, and Harrods incidents highlight a troubling trend of escalating attacks targeting customer-facing services. Remember, these aren’t just technical intrusions; they’re assaults on one of a brand’s most valuable assets: its reputation.
According to a 2024 report by the UK’s National Cyber Security Centre (NCSC), the retail sector saw a 22% increase in cyber incidents compared to the previous year, with phishing, ransomware, and credential stuffing among the most common attack vectors. Loyalty schemes, especially, have become a prime target, offering criminals a quick way to mine data that can be used for fraud and identity theft.
The loyalty scheme loophole
Loyalty programmes are designed to deepen the relationship between retailers and their customers. The personalised deals and rewards on offer encourage repeat business and build long-term value. However, these very systems are now becoming a weak link in the security chain.
In the case of M&S, it was precisely this aspect of their customer engagement that was compromised. While details remain under investigation, the nature of the breach raises questions about the security of customer data, who has access to it, and how resilient these systems are to both internal and external threats.
Retailers must now ask themselves difficult questions:
“Are your loyalty systems adequately protected?”
“Are you regularly audited and tested for vulnerabilities?”
And crucially: “are you transparent with customers about how their data is handled?”
Common vulnerabilities in retail’s digital backbone
As touched upon, there are several common cyber vulnerabilities that affect the retail industry. Many retailers – especially those with long operational histories – juggle a complex digital ecosystem made up of legacy systems, cloud-based platforms, and third-party vendors. This patchwork approach can unintentionally create blind spots for cyber attackers to exploit:
Outdated/unpatched software
Legacy systems, while still critical to operations in many retail chains, are often no longer supported with regular security updates. Unpatched vulnerabilities in these systems provide an easy entry point for attackers, particularly when they are exposed to the internet or linked to newer infrastructure.
Weak authentication protocols
Retail platforms frequently rely on basic username and password logins, leaving them vulnerable to credential stuffing attacks. Without multi-factor authentication (MFA) or behavioural monitoring, it’s easy for cyber-criminals to gain access using stolen credentials purchased on the dark web.
Insecure APIs/third-party integrations
Retailers heavily depend on third-party services for things like payment processing, analytics, and marketing automation. These integrations often use APIs, which, if poorly secured, can expose sensitive data or act as a conduit for malware.
Misconfigured cloud services
As retailers migrate to the cloud to improve scalability and efficiency, misconfigurations in cloud storage or access controls are becoming a leading cause of data exposure. Default settings or improperly set permissions can leave customer data publicly accessible.
Point-of-sale (POS) system attacks
Despite being physically located in stores, POS systems remain a high-value target. Attackers deploy malware to skim credit card details or intercept transaction data, often through phishing campaigns or compromised remote access tools.
Insider threats and human error
Retail employees, whether intentionally malicious or simply careless, can expose systems to attack. This includes everything from falling for phishing emails to mismanaging sensitive data or using weak passwords.
Lack of real-time monitoring and detection
Many retail organisations lack the tools or personnel to continuously monitor for suspicious activity across their networks. Without proper detection capabilities, breaches can go unnoticed for days or even weeks.
The battle for consumer trust
What makes retail cyber security incidents particularly damaging is the erosion of consumer trust. A big brand will usually harbour a long history and loyal customer base, enjoying a deep reservoir of goodwill that, surprisingly, is very easy to deplete once customers feel their personal data is not being handled responsibly.
According to YouGov, 64% of UK consumers would consider switching retailers if their data were compromised in a breach. Transparency and prompt action can mitigate some of the fallout, but the reputational damage can linger, affecting customer retention, brand perception, and even share price.
For retailers, this means cyber security can no longer be viewed as a back-office IT concern. It is, undoubtedly, a frontline issue and integral to the customer experience and the overall health of the brand. In this context, cyber security leaders and marketing heads must work hand in hand, aligning their strategies to ensure customer trust is not only earned, but actively safeguarded.
What can retailers do now?
I think the present climate presents an opportunity for the entire retail sector to reassess and strengthen its cyber security posture – this will also mean moving from a reactive to a proactive stance with several key shifts:
[textframe]Hardened MFA and secure password policies
Enforce phish-resistant MFA, such as FIDO2 and app authentication; also harden and enforce secure password policies and ensure the use of strong, unique passwords that are not re-used.
Zero Trust architecture
Adopting a Zero Trust approach, where no user or system is automatically trusted, can help limit the lateral movement of attackers within networks.
A strong patching policy
Keep all operating systems, software, and firmware up to date. You (or your cyber security services provider) should prioritise the patching of known vulnerabilities.
Network segmentation
Implement network segmentation to prevent the spread of ransomware.
Network port review
Conduct a review of open network ports and disable any unused ports and protocols.
Strong backup policy and infrastructure
Regularly and securely back up data, ensure it is encrypted, and test your restore policy to see how quickly and efficiently you can rebuild after a major incident.
End-to-end risk assessments
Retailers must regularly conduct comprehensive risk assessments that span all digital touchpoints, from point-of-sale terminals to loyalty databases.
User education
Don’t underestimate the power of education. Ensure staff are regularly tested and informed on phishing, smishing, and other advanced social engineering tactics as these are common tactics used against retailers.
Third-party audits
Many breaches originate through third-party services. Retailers should ensure their vendors are held to rigorous security standards.
Heightened vigilance
Maintain vigilance against social engineering, monitor user behaviour, and watch for suspicious user requests.
Incident response planning
In the event of a cyber incident, having a tested, agile incident response plan can be the difference between a minor disruption and a full-blown crisis.[/textframe]
Cyber resilience is the new brand strength
To wrap this article up, one message rings clear: cyber resilience is not optional.
Indeed, for modern retailers, it must be woven into the fabric of their operations, as essential to the business as merchandising or marketing. Consumers expect not only convenience and personalisation, but security and transparency as standard.
Retailers who can demonstrate that they take cyber threats seriously, by investing in the right technologies, people, and processes, will be better positioned to maintain trust and loyalty in an increasingly competitive retail landscape.
To find out more about how Littlefish has helped secure the digital world of our retail customers, or how our team could help you become more cyber prepared, please get in touch using the button on this page.
![]()