This guide covers the complete cyber security landscape for online and physical retailers in the UK — the specific threats, compliance obligations, and practical controls that every store should have in place. It is written for retail owners, operations directors, and e-commerce managers who need an accurate, actionable view of what security looks like for a retail business handling customer data and card payments.
Your Specific Risk Profile
A retailer's cyber risk profile is shaped by three factors that are specific to the sector: the handling of payment card data at every customer transaction, the direct relationship between system availability and revenue (a compromised or unavailable system is immediately lost sales), and the combination of physical and digital infrastructure that creates a more complex security perimeter than either alone.
The highest-impact incident types for retailers are card data theft (which creates PCI DSS, GDPR, and reputational consequences simultaneously), ransomware targeting the EPoS or e-commerce platform (which stops trading immediately), and customer database exfiltration (which creates GDPR notification requirements and provides the raw material for phishing attacks against your customer base).
E-commerce Platform Security
Choose the Right Payment Integration
The most important single decision for e-commerce security is how card data flows through your checkout. If you use a fully hosted payment page — Stripe Checkout, PayPal's hosted page, Sagepay's hosted form — card data never touches your server and your PCI scope is minimal. If you embed a payment form on your own page using JavaScript, you are responsible for the security of that page and everything loaded on it.
If you currently use an embedded payment form, review whether a hosted checkout is technically feasible. The security benefit of moving card data off your domain is substantial: it eliminates the Magecart web skimming attack vector entirely for card data capture, and reduces your PCI scope significantly.
Third-Party JavaScript Hygiene
Every third-party JavaScript tag loaded on your website — analytics, chat, reviews, advertising pixels, affiliate tracking — is code that runs in your customers' browsers with the same privileges as your own code. A compromise of any of these third-party services is an indirect compromise of your site. Review the JavaScript loaded on your checkout page specifically, and apply the principle of minimisation: load only what is genuinely necessary on the checkout page, from providers whose security you have some confidence in.
Implement a Content Security Policy (CSP) header on your website to restrict which domains can load scripts. A well-configured CSP is the most effective technical control against web skimming attacks — it prevents injected JavaScript from being executed. This requires development resource to implement correctly, but it is the right long-term control for any e-commerce site handling card data.
Platform and Plugin Updates
E-commerce platforms built on WooCommerce, Shopify, Magento, or similar systems depend on both the core platform and the plugins or apps built on top of it. Platform updates and plugin updates frequently contain security fixes. A site running an outdated version of WooCommerce, or using plugins that haven't been updated in 18 months, is exposing known vulnerabilities to automated scanning tools that criminals use to identify targets at scale.
Enable automatic updates for the core platform where available. Audit installed plugins and apps quarterly: remove anything that is unused or unmaintained, and replace any plugin that has been abandoned by its developer with an actively maintained alternative.
EPoS and Physical Retail Security
Payment Terminal Security
Physical payment terminals — card readers, PIN pads, and integrated EPoS terminals — require specific physical and logical security controls. Train all staff who handle payment terminals to inspect them for signs of tampering before use: anything attached to or inserted into the terminal, unusual overlay devices on the keypad, or damage to tamper-evident seals. The attack surface for physical skimming is reduced by positioning terminals where staff have a direct line of sight and customers have privacy for PIN entry.
Ensure payment terminals are provided and maintained by your acquiring bank or a PCI-compliant terminal provider. Do not use third-party terminal software or hardware that your acquirer has not approved. Keep terminal firmware current by applying updates when notified by your provider.
EPoS Network Segmentation
The network that EPoS terminals connect to should be separate from the network used for general office computing, staff browsing, and guest Wi-Fi. A staff member who inadvertently visits a malicious website on the same network as the tills should not provide a pathway to the payment infrastructure. VLAN separation between the cardholder data environment and other networks is a PCI DSS requirement and a practical security control for any retailer with managed switching equipment.
Ransomware Resilience for Physical Retail
A ransomware attack that takes the EPoS system offline during trading hours is an immediate revenue event. The resilience controls specific to physical retail: maintain an offline backup of the EPoS configuration and product/price database that can be restored to replacement hardware within hours; have a documented manual trading procedure for periods when the system is unavailable (cash-only trading, manual receipts); and ensure your IT provider has emergency response availability, not just business-hours support.
Customer Database Security
Your customer database is both a commercial asset and a GDPR liability. It enables marketing, loyalty schemes, and order history — and it creates a breach notification obligation if compromised. Apply data minimisation: collect only what you need, retain it only for as long as necessary, and delete records that are no longer required under your retention policy. A customer who made one purchase five years ago and has had no contact since may not need to remain in your active customer database.
Restrict access to the customer database to the roles that genuinely need it. A warehouse operative or a shop floor staff member does not need access to the full customer record. Database access should be logged and reviewed periodically for unusual patterns — bulk exports, access outside working hours, queries against large portions of the database.
Peak Trading Period Planning
Black Friday, the pre-Christmas period, January sales, and any other significant trading event are both your highest-revenue periods and your highest-risk periods for cyber incidents. Attackers time retail attacks to maximise leverage. Your security planning should explicitly address these periods:
- Ensure all patching is current before the peak period begins — applying emergency patches during a trading peak is disruptive
- Confirm backup systems are tested and current before the peak begins
- Ensure your IT provider and security monitoring service have emergency contact details for the trading period, including out-of-hours escalation
- Brief customer service and operations staff on the increased phishing risk during peak periods — both to the business and in the form of customer account takeover attempts that generate fraudulent orders
The Investment Case
A mid-sized online or multichannel retailer with 10 to 30 staff and a modest physical and digital infrastructure typically operates 20 to 50 networked assets — shop floor and warehouse devices, back-office computers, the e-commerce server or cloud connection, and EPoS terminals. This falls within the SOC in a Box Small or Medium plan.
The cost of a single web skimming incident — the forensic investigation, the PCI forensic examiner fees, the card reissuance costs passed back by the acquirer, the ICO notification process, and the customer notification costs — routinely exceeds £50,000 for a small to mid-sized retailer. The annual cost of monitoring that detects the incident before significant card data is exfiltrated is a fraction of that figure.
Further Reading
Trading Securely, Online and In-Store.
SOC in a Box provides 24/7 monitoring of your retail infrastructure — e-commerce platform, EPoS network, and customer database — with DLP for payment and customer data, PCI DSS Requirement 10 monitoring capability, and Cyber Essentials certification. Your named analyst monitors for the web skimming indicators and anomalous data transfers that signal an attack in progress. Five working days from order to live monitoring.
Book a scoping callDownload This Guide as a PDF
Get a copy of this complete guide to keep, share with colleagues, or read offline.
Download PDF