November 14, 2016 By Douglas Bonderud 2 min read

No longer considered Black Friday’s little brother, Cyber Monday is now a commercial force in its own right. As noted by CBS News, the e-commerce event has garnered more “editor’s choice” deals on high-profile sites than its older sibling. However, Help Net Security points out that online shopping security is also making an impact: A Computop survey found that 62 percent of shoppers plan to avoid shopping this Cyber Monday. So what’s behind this purchasing pause?

The Digital Divide

According to the survey, 76 percent of shoppers plan to order from online sites this holiday season, yet almost the same amount are sidestepping Cyber Monday shopping. This digital divide stems in part from increasing consumer savvy: 71 percent of consumers now check to see if sites have eTrust or secure sockets layer (SSL) certificates, while 64 percent are more careful about how and where they provide credit card information. Additionally, 61 percent have looked into the liability policy associated with their primary method of payment.

What’s more, 74 percent of respondents said they were “concerned” about disclosing credit card info online. This sets up an interesting dynamic; consumers see the benefits of web-based purchasing but are increasingly worried about online shopping security.

Case of the Mondays?

So why does Cyber Monday get singled out as the day to avoid? The simplest answer is high traffic volumes. Do a quick search for “Cyber Monday safety” and a variety of guides pop up, all aimed at helping consumers avoid scams during the shopping extravaganza.

Lifewire, for example, suggested looking for Monday deals using a store’s official website rather than a search engine to avoid phishing scams and fake apps and warned users to avoid email and pop-up coupons that offer deals that look too good to be true.

Since so many shoppers are eager to track down great bargains, the sheer volume of credit-ready web traffic to major retailers makes Cyber Monday an ideal attack vector for cybercriminals. Other events, such as Alibaba’s Singles’ Day, take in even more money than the post-Black Friday bonanza. As noted by Fortune, the online event registered more than $1 million worth of sales in just five minutes this year, making it another high-profile target for fraudsters.

Online Shopping Security Challenges

While secure e-commerce portals can help cultivate an entirely new group of consumers, even minor online shopping security problems may encourage users to visit physical stores or prioritize online shopping outside the confines of traffic-heavy Cyber Monday.

Expect this issue to get worse before it gets better. With consumers more tech-savvy than ever and other shopping events doing significantly more business than their stateside counterparts, keeping credit details close to the chest may be the best interim option until retail sites offer better authentication and guaranteed safe transactions.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today