Technology

State of Retail: Why Jewelers Need to Invest in Cybersecurity Now

TechnologyMay 25, 2023

State of Retail: Why Jewelers Need to Invest in Cybersecurity Now

As cybercrime incidents threaten the industry, jewelers need to know what they’re up against and the best ways to protect their businesses.

Graphic of phishing scheme
Editor’s Note: This story first appeared in the print edition of the 2023 State of the Majors. Click here to see the full issue.

From safes to showcases, security is one of a jeweler’s most critical investments, but many in the industry lack proper protection against a veritable army of invisible intruders.

Cybercriminals are a growing threat to businesses and governments worldwide, emptying bank accounts and holding customer information for ransom.

Protecting your business from cyberattacks is a complex task, accomplished using a mix of software, employee education, cyber liability insurance, and other tools.

National Jeweler spoke with security and insurance experts about the best ways for jewelers and their employees to stay safe online and guard their businesses.

The jewelry industry needs more cybersecurity education.

Independent, family-owned businesses can be a wealth of information, carrying on generational know-how and exhibiting top-tier customer service skills that rival, or even best, their big-name competitors.

What many lack in comparison, however, is cybersecurity expertise.

“Cybercrime experts say it is more accurate to say ‘when’ versus ‘if’ when talking about a cyberattack.” — Grant Hansen, Jewelers Mutual

A 2022 Nationwide Insurance survey found that just over half (56 percent) of small business owners offer cybersecurity training once a year, compared with 94 percent of middle-market companies.

Less than 30 percent of those surveyed said they have cyber liability insurance, compared with 83 percent of middle-market firms.

Independent jewelers far too often slip into the cybersecurity learning gap.

“I would say generally they are not well informed,” says Ryan Ruddock, senior crime analyst at the Jewelers’ Security Alliance.

“We haven’t had a very large sample size, but we have had enough that I would say jewelers still need to have ongoing education and increased awareness to prevent future [cybercrime] incidents from occurring.”

Jewelers Mutual’s Chief Information Security Officer Grant Hansen says cybercrime is beginning to show up on jewelers’ radars as the frequency of incidents increases, but the subject can “take a back seat to the more high-profile concerns affecting jewelers, such as burglary and robbery.”

However, a cybercrime attack can be just as costly, both monetarily and to a jeweler’s reputation.

The Nationwide survey found that, on average, cyber liability claims range from $15,000 to $25,000. The average recovery time for a business is 279 days— three-quarters of a year.

Notably, 76 percent of consumers surveyed said they would stop doing business with a company responsible for a data breach that impacted them.

“Every business, large or small, needs to stay vigilant to cybercrimes and keep cybersecurity top of mind with staff. Cybercrime experts say it is more accurate to say ‘when’ versus ‘if’ when talking about a cyberattack. Jewelers need to prepare accordingly,” says Hansen.

Social engineering and phishing schemes are growing threats.

Phishing, the practice of sending emails pretending to be a reputable company under the guise of stealing personal information like passwords and credit card numbers, may sound familiar, but there is another, more sinister layer to the scheme jewelers need to know about.

Social engineering, a form of impersonation, adds a level of complexity to phishing scams.

“Social engineering has been referred to as ‘the art of human hacking’ and it entails individuals researching members of the company, their positions, their job functions, and then impersonating them through emails,” says Ruddock.

It’s a more targeted form of phishing wherein the criminal is doing in-depth research into a jeweler and their business in order to attempt to defraud them. 

Pretending to be a known contact or supplier, the phishing email will ask the recipient to make a payment or send out jewelry.

“The specific research the cybercriminals are doing, which is also known as pretexting, has been something they’ve had a considerable amount of success with in specific cases,” says Ruddock.

While some phishing schemes target an individual, most don’t. Often, a mass email is sent with the idea that some percentage of recipients will fall for it.

Phishing schemes, sophisticated or not, are one of the most common cybercrimes affecting jewelers, he says, and there are key things to be wary of when an email is received.

Red flags include misspellings and poor grammar, as well as emails that create a sense of urgency, pushing the recipient to do something quickly and without thinking.

Be wary of email spoofing, which is when an email is sent from an address that’s almost, but not quite, identical to a genuine email address for a contact. Two lowercase letter “n”s side by side are commonly used to mimic “m,” notes Ruddock as an example.

A good rule of thumb is to delete any email that doesn’t look right and verify the request with the vendor or customer by phone.

If a link in a possible phishing email is clicked, the recipient should disconnect from Wi-Fi, which could prevent malware (malicious software) from being installed on the computer; run an antivirus scan; and change passwords.

To combat phishing scams, Ruddock recommends turning to the experts.

“Hire a company that specializes in phishing training and make sure you’re taking the necessary steps to remediate and prevent future sophisticated phishing attacks,” he says.

Professor Jason Hong of Carnegie Mellon University’s Human-Computer Interaction Institute is one such expert.

“Security training is a lot like literacy…. It's something that you just have to do with every generation,”- Jason Hong, Professor at Carnegie Mellon University

In 2004, he and a team began researching phishing schemes and why people fall for them, backed by funding from the National Science Foundation.

“Back when we were doing this research, a lot of people didn’t think cybersecurity training could work at all because it tended to be really boring and dry,” he says. “We figured we could actually make it fun and interesting.”

Around 2007, Hong was part of a team at the university’s CyLab Usable Privacy and Security (CUPS) Laboratory that developed an online game called “Anti-Phishing Phil,” an interactive cybersecurity educational tool.

“It’s a game where you’re Phil the Fish and your job is to eat all the good worms and to avoid all the bad worms. And every worm has a web address associated with it and you have to differentiate between the good ones and the bad ones,” explains Hong.

As players navigate the fictional body of water dubbed Interweb Bay, they learn to recognize common phishing tactics.

“We’re trying to teach people how to read those URLs and to recognize a fake one,” he says.

There’s a tendency to believe that older, less tech-savvy people are more susceptible to phishing scams, but the university’s research doesn’t back up this assumption.

Hong recalls a Carnegie Mellon study of around 500 people, including students and faculty.

“Almost everybody thinks older people are more likely to fall for phishing scams, but our data shows actually the opposite, that, surprisingly, younger people are much more likely to fall for these scams,” he says.

Determining the reasons for the discrepancy would require a follow-up study for an official answer, he says, though he posits it could be because younger people “click on everything,” or because they just have less to lose than a more financially stable and, ostensibly, more cautious, older person.

Nearly two decades since his research began, Hong maintains phishing is the biggest cybersecurity threat to both businesses and individuals. Education on the topic must continue.

“Security training is a lot like literacy. We’re never going to solve literacy. It’s something you just have to do with every generation, and you still need lots of practice for people, too,” he says.

Anti-Phishing Phil game screenshot


In addition to creating the Anti-Phishing Phil game, a screenshot of which is pictured above, Hong was a member of a team that developed a simulator that sent phishing emails to a company’s employees to see what could happen in real life.

Less than a quarter of small business owners send regular phishing test emails to employees, as per the Nationwide survey, but it’s something JSA’s Ruddock recommends.
“In the event an employee does click on a link, that’s really just an opportunity for enhanced training,” he says.

Not properly training oneself or employees about phishing scams could be a costly mistake.

Ruddock recalls a criminal case involving a man named Jimmy Sabatino, who is serving a 20-year sentence for his role in stealing more than $10 million in luxury goods from behind bars in 2014 and 2015. 

As previously reported by National Jeweler, Sabatino, then an inmate in federal prison in Miami, pretended to be a music executive representing stars like Beyoncé and Justin Timberlake.

Using fake email accounts, he convinced major jewelry companies to send out pieces he claimed would be worn in music videos, sometimes via armored cars. His co-conspirators on the outside then picked up the jewelry and sold it at pawn shops.

The crew made off with a significant amount of jewelry, including a 7.29-carat oval-cut diamond and an 8.55-carat emerald-cut diamond.
 
“Companies should only be keeping the information that’s absolutely critical for them to conduct their business functions.” — Ryan Ruddock, Jewelers’ Security Alliance

In light of ransomware attacks, be mindful of data collection and storage.

Ransomware is a type of malware that encrypts files on a device, leaving users unable to access them until a ransom is paid.

In fall 2021, high-end jeweler Graff was hit with a ransomware attack and ended up paying $7.5 million to retrieve its data. The group of cybercriminals responsible for the attack, named Conti, released personally identifiable information about some of Graff’s customers before a deal was made.

The most common cybercrime reported to Jewelers Mutual is ransomware attacks, says Hansen, with policyholders requesting assistance to unlock their software.

Similarly, the company has had reports of a ransomware-like attack in which a jeweler’s social media accounts are hacked by criminals who request a ransom payment.

“Many jewelers’ businesses are supported by their social media platforms, particularly Instagram,” notes Hansen.

In contrast, JSA hasn’t received many reports of ransomware attacks, says Ruddock, but jewelers should still be aware of the possibility and protect their businesses.

“The No. 1 way you can protect yourself from ransomware is to make sure you’re backing up your data, particularly having offline, also known as cold storage, backups,” he says.
Many companies offer hourly or daily cloud storage backup services, he says, for as little as $10 per month.

Backing up data gives the jeweler control rather than depending on an outside entity—in the case of a ransomware attack, this means a criminal—to restore the service.

“Law enforcement has talked about [backing up] as being the best way to prevent ransomware, because if you’re backing up your data, you’re not going to have to rely on the attacker to decrypt your data.”

Another key tip for protecting a business from ransomware attacks is data minimization.

“Companies should only be keeping the information that’s absolutely critical for them to conduct their business functions. If you don’t absolutely need it to make a sale, you really shouldn’t have that information,” says Ruddock.

This especially applies to credit card information, he says, which customers should manually enter each time rather than using a “save card information” option.

“By practicing data minimization, you reduce the opportunity for a possible data breach, for an attacker to compromise your systems and then demand ransom.”

Keep an eye on tracking numbers.

A perhaps lesser-known cybercrime scam involves using the tracking number information issued by delivery companies such as UPS and FedEx to steal packages, so Ruddock advises keeping that information under wraps.

“The reason why you don’t want to share your tracking number is because the person who’s engaged in social engineering can take that number, and then they can actually reach out to your shipping company and have the package rerouted to any location that they want.”

If a customer calls for a tracking number, be sure to verify their identity before giving out that information to avoid having their package rerouted to an unintended recipient.

“By not giving out the tracking number, you reduce the opportunity for somebody to divert a package and to send it to a different location,” he says.

Jewelers also can talk with their shipper about how change of address requests are handled.

They can set a limit on the number of times an address can be changed on a shipment or request a package be returned to them if a change of address attempt is made.

Employees can work from home safely, if  the right security measures are in place.

The COVID-19 pandemic led to more employees working from home and many have remained there, posing a new, but manageable, security risk.

“What we suggest is employees utilize VPNs, or virtual private networks, to make sure their communications are encrypted and away from prying eyes,” says Ruddock.

When employees use their personal devices to access company records, there are some security unknowns, like which websites they’re visiting, their downloads, potential malware, and a lack of antivirus protection.

“It’s increasing the opportunity for an attacker to potentially compromise your business systems if there’s no separation,” he says.

In addition to using a VPN, he recommends employees install antivirus and antimalware software on their computers and keep those programs up to date.

The same applies to employees who work from their personal cell phones. “If they are accessing company systems via their phone, it’s an increased challenge,” he says.

If an employer can afford to give employees work cell phones, says Ruddock, that’s the ideal scenario.

Regardless of where employees are working, Jewelers Mutual’s Hansen also recommends the use of access controls, meaning employers should determine the appropriate level of employee access to data, apps, and resources, giving necessary authorization only.

There should also be an incident response protocol in place so employees know who to reach out to in the event of a possible cybersecurity incident.

These are the tips and resources jewelers need to know.

There are many resources available for jewelers looking to learn more about cybercrime and how to prevent it.

It can be an arduous task, but Professor Hong proposes jewelers look into what’s known as their “threat model.”

“This is probably one of the most important concepts in computer security,” he says. “What are you trying to protect? Who are you trying to protect it from? And how important is it to you?”

What a jeweler spends on cybersecurity likely will be less than what they stand to lose by not protecting their business.

“Most cybersecurity is actually pretty basic, but putting it in practice is the hard part,” he says.

His recommendations include standard cybersecurity best practices, like setting up two-factor authentication on important accounts, particularly email accounts.

Hong advises creating strong passwords for key accounts, avoiding the reuse of passwords, and using a password manager to keep track.

Also, “Make sure you’re installing the software updates, the ones we all hate to do, but there’s a reason those software updates are there,” he says.

JSA’s Ruddock has a list of helpful websites for jewelers to visit (see below).

One of the most important resources, however, may be the insurance company. Prevention is key, but in the event of a cyberattack, cyber liability insurance could be a saving grace.

Jewelers should look into cyber liability insurance.

Jewelers Mutual, as well as many other insurance providers, offer products that will cover the financial and reputational fallout related to the impact of certain cybercrimes.

“A cyber event can result in a significant financial loss for a jeweler,” says Hansen. “Cyber liability coverage that steps in to indemnify a jeweler for their financial loss and pays for professional assistance to mitigate the damage caused by a data breach makes this coverage extremely important.”

Data breach and cyber-related protections can be added on to a jeweler’s block policy, providing coverage for privacy and security breaches, cyber extortion, cyberterrorism, or cybercrime, like phishing schemes. In some cases, insurance may even cover a ransomware payment.

“Our cyber liability coverage endorsement is already in place for many of our jewelers,” he says. “We expect jewelers are having more conversations about cyber coverage with their agents or brokers.”

This type of insurance can cover first-party losses, like money lost due to financial fraud, as well as liability claims, lawsuits, and regulatory penalties.

Many states require a business to notify customers if personally identifiable information has been released in a data breach, and that process can be costly.

Cyber insurance can cover the costs of that notification as well as fees related to recovering stolen data and restoring data and computer systems to their state before the cyberattack.

Some policies may also cover the cost of hiring a forensic information technology team to assess the extent of the breach and/or hiring a public relations firm to help a business’ reputation if news of a breach goes public.

“Customer and vendor relationships within the jewelry industry are built and sustained on trust. A cyber event can adversely impact this level of trust. Jewelers must invest in the training, software and insurance that best protects and assists with the risk of cybercrime,” says Hansen.

Cybersecurity Resources to Know

Implementing cybersecurity protections can be a complex task, but there are a wealth of tools available to small business owners. From software patches to security scans, here are a few helpful resources, as recommended by JSA’s Ryan Ruddock.

The Federal Communications Commission’s Cyberplanner helps small businesses create their own customized cybersecurity plans.

The Department of Homeland Security introduced a “Stop. Think. Connect.” campaign with employee training resources.

SoftwarePatch offers updated patches for computer and software applications. A patch is a change or update that can fix security vulnerabilities or other technical issues.

Fraud.org, created by the National Consumers League, also has helpful security tips and sends out fraud alerts.

The National Cybersecurity Alliance’s website offers free computer security scan tools for a PC or network.

IT security company Sophos has a news site, titled Naked Security, that sends out a daily newsletter with opinions, advice, and research on computer security issues and the latest internet threats.

The Federal Bureau of Investigation’s Internet Crime Complaint Center is a resource for reporting cybercrime. Jewelers can also reach out to JSA.

The Latest

Heavenly Vices Mother Father Spinner Necklace
TrendsOct 31, 2025
Piece of the Week: A Spinner Fit for ‘Frankenstein’

This “Mother Father” spinner necklace from Heavenly Vices Fine Jewelry draws inspiration from Victorian Era jewelry.

Interpol Stolen Works of Art Database, The Louvre Museum Graphic
CrimeOct 31, 2025
5 More Arrested in Louvre Heist, Jewelry Still Missing

The suspects were rounded up in Paris and its suburbs on Wednesday night, but none of the stolen jewels were recovered with them.

My Next Question webinar graphic
Recorded WebinarsOct 31, 2025
Watch: How to Master Google Reviews for Your Business

Experts share top tips on how to encourage positive reviews and handle negative feedback.

Supplier Spotlight -Recorded-Webinar.png
Brought to you by
Watch: Introducing GIA Jewelry Services

Supplier Spotlight Sponsored by GIA

GIA iD100® Technology
Supplier BulletinOct 30, 2025
Protect Your Customers and Your Business

Sponsored by the Gemological Institute of America

Weekly QuizOct 30, 2025
This Week’s Quiz
Test your jewelry news knowledge by answering these questions.
Take the Quiz
Seattle PD image of Menashe & Sons Jewelers following Aug. 14 smash-and-grab robbery
CrimeOct 30, 2025
29-Year-Old Man Charged in Multiple Seattle-Area Smash and Grabs

The suspect faces charges in the August robbery of Menashe & Sons Jewelers and is accused of committing smash and grabs at two pawn shops.

Alison Lou Lumière Fine Collection On-Model
Lab-GrownOct 30, 2025
Alison Lou’s New Collection Uses Lab-Grown Diamonds and Resin

The “Lumière Fine” collection was born from designer Alison Chemla’s interest in the transformative power of light.

DEBEERS_DAY4_DSC_1023-01_1872x1052.jpg
Brought to you by
DESERT DIAMONDS: The Newest Trend in Natural Diamond Jewelry

From sunlit whites to smoky whiskeys, introduce your clients to extraordinary diamonds in colors as unique as their love.

Buddha Mama gold skull pave huggies
TrendsOct 30, 2025
Amanda’s Style File: A Haunted Halloween

Show off your spooky side with these 12 festive jewels.

Is This Love That I’m Feeling event imagery
Events & AwardsOct 30, 2025
Jewelers Mutual to Host Jewelry Panel at Frazier History Museum

The “Brilliant & Beyond” panel coincides with the “Love & Marriage” exhibition curated by Davis Jewelers in Louisville, Kentucky.

Stock image of person holding shopping bags
Events & AwardsOct 29, 2025
October Brings Little Change to Consumer Confidence

Consumers are feeling more optimistic about their present situation while the short-term future remains a little scary.

Couture show
Events & AwardsOct 29, 2025
Couture Partners With Time to Watches

The company, which organizes a watch show in Geneva every spring, will bring a selection of watch brands to the 2026 Couture show in Vegas.

The Modern Guide to Vintage Jewelry by Beth Bernstein
TrendsOct 29, 2025
Beth Bernstein Releases Vintage Jewelry Guide

“The Modern Guide to Vintage Jewellery” follows the evolution of jewelry design from the ‘30s to the ‘80s with buying and styling advice.

Collage of bug jewelry
EditorsOct 29, 2025
Why Creepy, Crawly Bugs Inspire Beautiful Jewelry

For her annual Halloween story, Senior Editor Lenore Fedow explores the symbolism behind spiders, beetles, and other eerie insects.

Gem Awards 2025 at Cipriani New York
Events & AwardsOct 28, 2025
Meet the 2026 Gem Award Nominees

Notable jewelry designers, members of the press, and retailers are up for an award at next year’s gala.

Graphic for Jewelers of America’s 2025 State of the Industry webinar
Recorded WebinarsOct 28, 2025
Watch: The State of the Jewelry Industry

Leaders from Jewelers of America and National Jeweler discuss the gold price, tariffs, and more in this one-hour webinar.

Eriness One of One Collection Rings and Necklace
CollectionsOct 28, 2025
Eriness Reflects on Life in ‘One of One’ Collection

After experiencing motherhood, growth, and loss, founder and designer Erin Sachse has created 10 irreplaceable jewels.

Napoleon’s diamond brooch and a pearl and diamond hair ornament
AuctionsOct 27, 2025
Napoleon Left This Brooch Behind, And Now It’s Up For Auction

It is part of Sotheby’s “Royal & Noble Jewels” sale along with an ornate hair ornament and an old mine-cut light pink diamond ring.

Marie Louise’s emerald necklace and earrings stolen in the heist at the Louvre Museum
CrimeOct 27, 2025
Arrests Made in Louvre Jewel Heist

One of the individuals was apprehended at the airport as he was trying to flee the country.

Holiday shoppers in Target
MajorsOct 27, 2025
Target to Cut 1,800 Corporate Jobs

The retailer, which has faced struggling sales in recent quarters, is looking to streamline its operations.

Hill Management Group
Events & AwardsOct 27, 2025
Hill Management Group Hired to Help Atlanta Jewelry Show

Hill Management Group will oversee, market, and produce next year’s spring show.

Bonhams New Bond Street London flagship
AuctionsOct 24, 2025
Bonhams Under New Ownership, Top Executives Replaced

London-based investment firm Pemberton Asset Management acquired the auction house for an undisclosed amount.

De Beers Diamond View Zoom machine with monitor
GradingOct 24, 2025
DMIA to Hold Diamond Testing Instrument Demo

The workshop will give attendees the chance to try out and ask questions about three different diamond verification instruments.

Two brooches stolen in the October 2025 heist at the Louvre Museum in Paris
CrimeOct 24, 2025
Video Emerges of Louvre Jewelry Robbers Fleeing the Scene

The footage shows two of the jewelry heist suspects descending from the second floor of the museum and then escaping via scooter.

Wyld Box Jewelry Ray of Light Large Drop Earrings
CollectionsOct 24, 2025
Piece of the Week: Wyld Box Jewelry’s ‘Ray of Light’ Earrings

Founder and designer Rosanna Fiedler looked to a vintage Cartier clutch when designing the sunlight-inspired drop earrings.

Tiffany & Co. Bird on a Rock pendant
FinancialsOct 23, 2025
Jewelry Sales Resilient Despite Struggles at LVMH, Kering

The luxury conglomerates faced a challenging Q3 amid geopolitical and economic tensions.

Cullinan Diamond Mine plant
SourcingOct 23, 2025
Petra Diamonds Turns to Shareholders to Raise Capital

The struggling diamond mining company, which owns the historic Cullinan mine, has launched a rights issue to raise about $25 million.

×

This site uses cookies to give you the best online experience. By continuing to use & browse this site, we assume you agree to our Privacy Policy