Technology

State of Retail: Why Jewelers Need to Invest in Cybersecurity Now

TechnologyMay 25, 2023

State of Retail: Why Jewelers Need to Invest in Cybersecurity Now

As cybercrime incidents threaten the industry, jewelers need to know what they’re up against and the best ways to protect their businesses.

Graphic of phishing scheme
Editor’s Note: This story first appeared in the print edition of the 2023 State of the Majors. Click here to see the full issue.

From safes to showcases, security is one of a jeweler’s most critical investments, but many in the industry lack proper protection against a veritable army of invisible intruders.

Cybercriminals are a growing threat to businesses and governments worldwide, emptying bank accounts and holding customer information for ransom.

Protecting your business from cyberattacks is a complex task, accomplished using a mix of software, employee education, cyber liability insurance, and other tools.

National Jeweler spoke with security and insurance experts about the best ways for jewelers and their employees to stay safe online and guard their businesses.

The jewelry industry needs more cybersecurity education.

Independent, family-owned businesses can be a wealth of information, carrying on generational know-how and exhibiting top-tier customer service skills that rival, or even best, their big-name competitors.

What many lack in comparison, however, is cybersecurity expertise.

“Cybercrime experts say it is more accurate to say ‘when’ versus ‘if’ when talking about a cyberattack.” — Grant Hansen, Jewelers Mutual

A 2022 Nationwide Insurance survey found that just over half (56 percent) of small business owners offer cybersecurity training once a year, compared with 94 percent of middle-market companies.

Less than 30 percent of those surveyed said they have cyber liability insurance, compared with 83 percent of middle-market firms.

Independent jewelers far too often slip into the cybersecurity learning gap.

“I would say generally they are not well informed,” says Ryan Ruddock, senior crime analyst at the Jewelers’ Security Alliance.

“We haven’t had a very large sample size, but we have had enough that I would say jewelers still need to have ongoing education and increased awareness to prevent future [cybercrime] incidents from occurring.”

Jewelers Mutual’s Chief Information Security Officer Grant Hansen says cybercrime is beginning to show up on jewelers’ radars as the frequency of incidents increases, but the subject can “take a back seat to the more high-profile concerns affecting jewelers, such as burglary and robbery.”

However, a cybercrime attack can be just as costly, both monetarily and to a jeweler’s reputation.

The Nationwide survey found that, on average, cyber liability claims range from $15,000 to $25,000. The average recovery time for a business is 279 days— three-quarters of a year.

Notably, 76 percent of consumers surveyed said they would stop doing business with a company responsible for a data breach that impacted them.

“Every business, large or small, needs to stay vigilant to cybercrimes and keep cybersecurity top of mind with staff. Cybercrime experts say it is more accurate to say ‘when’ versus ‘if’ when talking about a cyberattack. Jewelers need to prepare accordingly,” says Hansen.

Social engineering and phishing schemes are growing threats.

Phishing, the practice of sending emails pretending to be a reputable company under the guise of stealing personal information like passwords and credit card numbers, may sound familiar, but there is another, more sinister layer to the scheme jewelers need to know about.

Social engineering, a form of impersonation, adds a level of complexity to phishing scams.

“Social engineering has been referred to as ‘the art of human hacking’ and it entails individuals researching members of the company, their positions, their job functions, and then impersonating them through emails,” says Ruddock.

It’s a more targeted form of phishing wherein the criminal is doing in-depth research into a jeweler and their business in order to attempt to defraud them. 

Pretending to be a known contact or supplier, the phishing email will ask the recipient to make a payment or send out jewelry.

“The specific research the cybercriminals are doing, which is also known as pretexting, has been something they’ve had a considerable amount of success with in specific cases,” says Ruddock.

While some phishing schemes target an individual, most don’t. Often, a mass email is sent with the idea that some percentage of recipients will fall for it.

Phishing schemes, sophisticated or not, are one of the most common cybercrimes affecting jewelers, he says, and there are key things to be wary of when an email is received.

Red flags include misspellings and poor grammar, as well as emails that create a sense of urgency, pushing the recipient to do something quickly and without thinking.

Be wary of email spoofing, which is when an email is sent from an address that’s almost, but not quite, identical to a genuine email address for a contact. Two lowercase letter “n”s side by side are commonly used to mimic “m,” notes Ruddock as an example.

A good rule of thumb is to delete any email that doesn’t look right and verify the request with the vendor or customer by phone.

If a link in a possible phishing email is clicked, the recipient should disconnect from Wi-Fi, which could prevent malware (malicious software) from being installed on the computer; run an antivirus scan; and change passwords.

To combat phishing scams, Ruddock recommends turning to the experts.

“Hire a company that specializes in phishing training and make sure you’re taking the necessary steps to remediate and prevent future sophisticated phishing attacks,” he says.

Professor Jason Hong of Carnegie Mellon University’s Human-Computer Interaction Institute is one such expert.

“Security training is a lot like literacy…. It's something that you just have to do with every generation,”- Jason Hong, Professor at Carnegie Mellon University

In 2004, he and a team began researching phishing schemes and why people fall for them, backed by funding from the National Science Foundation.

“Back when we were doing this research, a lot of people didn’t think cybersecurity training could work at all because it tended to be really boring and dry,” he says. “We figured we could actually make it fun and interesting.”

Around 2007, Hong was part of a team at the university’s CyLab Usable Privacy and Security (CUPS) Laboratory that developed an online game called “Anti-Phishing Phil,” an interactive cybersecurity educational tool.

“It’s a game where you’re Phil the Fish and your job is to eat all the good worms and to avoid all the bad worms. And every worm has a web address associated with it and you have to differentiate between the good ones and the bad ones,” explains Hong.

As players navigate the fictional body of water dubbed Interweb Bay, they learn to recognize common phishing tactics.

“We’re trying to teach people how to read those URLs and to recognize a fake one,” he says.

There’s a tendency to believe that older, less tech-savvy people are more susceptible to phishing scams, but the university’s research doesn’t back up this assumption.

Hong recalls a Carnegie Mellon study of around 500 people, including students and faculty.

“Almost everybody thinks older people are more likely to fall for phishing scams, but our data shows actually the opposite, that, surprisingly, younger people are much more likely to fall for these scams,” he says.

Determining the reasons for the discrepancy would require a follow-up study for an official answer, he says, though he posits it could be because younger people “click on everything,” or because they just have less to lose than a more financially stable and, ostensibly, more cautious, older person.

Nearly two decades since his research began, Hong maintains phishing is the biggest cybersecurity threat to both businesses and individuals. Education on the topic must continue.

“Security training is a lot like literacy. We’re never going to solve literacy. It’s something you just have to do with every generation, and you still need lots of practice for people, too,” he says.

Anti-Phishing Phil game screenshot


In addition to creating the Anti-Phishing Phil game, a screenshot of which is pictured above, Hong was a member of a team that developed a simulator that sent phishing emails to a company’s employees to see what could happen in real life.

Less than a quarter of small business owners send regular phishing test emails to employees, as per the Nationwide survey, but it’s something JSA’s Ruddock recommends.
“In the event an employee does click on a link, that’s really just an opportunity for enhanced training,” he says.

Not properly training oneself or employees about phishing scams could be a costly mistake.

Ruddock recalls a criminal case involving a man named Jimmy Sabatino, who is serving a 20-year sentence for his role in stealing more than $10 million in luxury goods from behind bars in 2014 and 2015. 

As previously reported by National Jeweler, Sabatino, then an inmate in federal prison in Miami, pretended to be a music executive representing stars like Beyoncé and Justin Timberlake.

Using fake email accounts, he convinced major jewelry companies to send out pieces he claimed would be worn in music videos, sometimes via armored cars. His co-conspirators on the outside then picked up the jewelry and sold it at pawn shops.

The crew made off with a significant amount of jewelry, including a 7.29-carat oval-cut diamond and an 8.55-carat emerald-cut diamond.
 
“Companies should only be keeping the information that’s absolutely critical for them to conduct their business functions.” — Ryan Ruddock, Jewelers’ Security Alliance

In light of ransomware attacks, be mindful of data collection and storage.

Ransomware is a type of malware that encrypts files on a device, leaving users unable to access them until a ransom is paid.

In fall 2021, high-end jeweler Graff was hit with a ransomware attack and ended up paying $7.5 million to retrieve its data. The group of cybercriminals responsible for the attack, named Conti, released personally identifiable information about some of Graff’s customers before a deal was made.

The most common cybercrime reported to Jewelers Mutual is ransomware attacks, says Hansen, with policyholders requesting assistance to unlock their software.

Similarly, the company has had reports of a ransomware-like attack in which a jeweler’s social media accounts are hacked by criminals who request a ransom payment.

“Many jewelers’ businesses are supported by their social media platforms, particularly Instagram,” notes Hansen.

In contrast, JSA hasn’t received many reports of ransomware attacks, says Ruddock, but jewelers should still be aware of the possibility and protect their businesses.

“The No. 1 way you can protect yourself from ransomware is to make sure you’re backing up your data, particularly having offline, also known as cold storage, backups,” he says.
Many companies offer hourly or daily cloud storage backup services, he says, for as little as $10 per month.

Backing up data gives the jeweler control rather than depending on an outside entity—in the case of a ransomware attack, this means a criminal—to restore the service.

“Law enforcement has talked about [backing up] as being the best way to prevent ransomware, because if you’re backing up your data, you’re not going to have to rely on the attacker to decrypt your data.”

Another key tip for protecting a business from ransomware attacks is data minimization.

“Companies should only be keeping the information that’s absolutely critical for them to conduct their business functions. If you don’t absolutely need it to make a sale, you really shouldn’t have that information,” says Ruddock.

This especially applies to credit card information, he says, which customers should manually enter each time rather than using a “save card information” option.

“By practicing data minimization, you reduce the opportunity for a possible data breach, for an attacker to compromise your systems and then demand ransom.”

Keep an eye on tracking numbers.

A perhaps lesser-known cybercrime scam involves using the tracking number information issued by delivery companies such as UPS and FedEx to steal packages, so Ruddock advises keeping that information under wraps.

“The reason why you don’t want to share your tracking number is because the person who’s engaged in social engineering can take that number, and then they can actually reach out to your shipping company and have the package rerouted to any location that they want.”

If a customer calls for a tracking number, be sure to verify their identity before giving out that information to avoid having their package rerouted to an unintended recipient.

“By not giving out the tracking number, you reduce the opportunity for somebody to divert a package and to send it to a different location,” he says.

Jewelers also can talk with their shipper about how change of address requests are handled.

They can set a limit on the number of times an address can be changed on a shipment or request a package be returned to them if a change of address attempt is made.

Employees can work from home safely, if  the right security measures are in place.

The COVID-19 pandemic led to more employees working from home and many have remained there, posing a new, but manageable, security risk.

“What we suggest is employees utilize VPNs, or virtual private networks, to make sure their communications are encrypted and away from prying eyes,” says Ruddock.

When employees use their personal devices to access company records, there are some security unknowns, like which websites they’re visiting, their downloads, potential malware, and a lack of antivirus protection.

“It’s increasing the opportunity for an attacker to potentially compromise your business systems if there’s no separation,” he says.

In addition to using a VPN, he recommends employees install antivirus and antimalware software on their computers and keep those programs up to date.

The same applies to employees who work from their personal cell phones. “If they are accessing company systems via their phone, it’s an increased challenge,” he says.

If an employer can afford to give employees work cell phones, says Ruddock, that’s the ideal scenario.

Regardless of where employees are working, Jewelers Mutual’s Hansen also recommends the use of access controls, meaning employers should determine the appropriate level of employee access to data, apps, and resources, giving necessary authorization only.

There should also be an incident response protocol in place so employees know who to reach out to in the event of a possible cybersecurity incident.

These are the tips and resources jewelers need to know.

There are many resources available for jewelers looking to learn more about cybercrime and how to prevent it.

It can be an arduous task, but Professor Hong proposes jewelers look into what’s known as their “threat model.”

“This is probably one of the most important concepts in computer security,” he says. “What are you trying to protect? Who are you trying to protect it from? And how important is it to you?”

What a jeweler spends on cybersecurity likely will be less than what they stand to lose by not protecting their business.

“Most cybersecurity is actually pretty basic, but putting it in practice is the hard part,” he says.

His recommendations include standard cybersecurity best practices, like setting up two-factor authentication on important accounts, particularly email accounts.

Hong advises creating strong passwords for key accounts, avoiding the reuse of passwords, and using a password manager to keep track.

Also, “Make sure you’re installing the software updates, the ones we all hate to do, but there’s a reason those software updates are there,” he says.

JSA’s Ruddock has a list of helpful websites for jewelers to visit (see below).

One of the most important resources, however, may be the insurance company. Prevention is key, but in the event of a cyberattack, cyber liability insurance could be a saving grace.

Jewelers should look into cyber liability insurance.

Jewelers Mutual, as well as many other insurance providers, offer products that will cover the financial and reputational fallout related to the impact of certain cybercrimes.

“A cyber event can result in a significant financial loss for a jeweler,” says Hansen. “Cyber liability coverage that steps in to indemnify a jeweler for their financial loss and pays for professional assistance to mitigate the damage caused by a data breach makes this coverage extremely important.”

Data breach and cyber-related protections can be added on to a jeweler’s block policy, providing coverage for privacy and security breaches, cyber extortion, cyberterrorism, or cybercrime, like phishing schemes. In some cases, insurance may even cover a ransomware payment.

“Our cyber liability coverage endorsement is already in place for many of our jewelers,” he says. “We expect jewelers are having more conversations about cyber coverage with their agents or brokers.”

This type of insurance can cover first-party losses, like money lost due to financial fraud, as well as liability claims, lawsuits, and regulatory penalties.

Many states require a business to notify customers if personally identifiable information has been released in a data breach, and that process can be costly.

Cyber insurance can cover the costs of that notification as well as fees related to recovering stolen data and restoring data and computer systems to their state before the cyberattack.

Some policies may also cover the cost of hiring a forensic information technology team to assess the extent of the breach and/or hiring a public relations firm to help a business’ reputation if news of a breach goes public.

“Customer and vendor relationships within the jewelry industry are built and sustained on trust. A cyber event can adversely impact this level of trust. Jewelers must invest in the training, software and insurance that best protects and assists with the risk of cybercrime,” says Hansen.

Cybersecurity Resources to Know

Implementing cybersecurity protections can be a complex task, but there are a wealth of tools available to small business owners. From software patches to security scans, here are a few helpful resources, as recommended by JSA’s Ryan Ruddock.

The Federal Communications Commission’s Cyberplanner helps small businesses create their own customized cybersecurity plans.

The Department of Homeland Security introduced a “Stop. Think. Connect.” campaign with employee training resources.

SoftwarePatch offers updated patches for computer and software applications. A patch is a change or update that can fix security vulnerabilities or other technical issues.

Fraud.org, created by the National Consumers League, also has helpful security tips and sends out fraud alerts.

The National Cybersecurity Alliance’s website offers free computer security scan tools for a PC or network.

IT security company Sophos has a news site, titled Naked Security, that sends out a daily newsletter with opinions, advice, and research on computer security issues and the latest internet threats.

The Federal Bureau of Investigation’s Internet Crime Complaint Center is a resource for reporting cybercrime. Jewelers can also reach out to JSA.

The Latest

Stock image of shipping containers
Policies & IssuesMay 29, 2025
Trade Court Declares Trump’s Tariffs Invalid

Three federal judges ruled that Trump exceeded his authority in imposing sweeping tariffs, a ruling his administration already has appealed.

Britney Spears
CollectionsMay 29, 2025
Britney Spears Files Trademark for New Jewelry Line

The pop icon is one step closer to launching her “B Tiny” jewelry collection, a collection she first began posting about last fall.

Inoveo Platinum Grain image.jpg
Supplier BulletinMay 29, 2025
Inoveo Platinum Grain, Exclusively Distributed by Stuller

Sponsored by Stuller

Article Image 1.png
Brought to you by
Clienteling Isn’t a Buzzword. It’s an Essential Business Model.

More shoppers are walking out without buying. Here’s how smart jewelers can bring them back—and the tool they need to do it right.

Grizzly Mining Pilala emerald
SourcingMay 29, 2025
Grizzly Auctions 6,620-Carat Emerald

It was featured in the miner’s latest sale, which brought in $24.8 million.

Weekly QuizMay 22, 2025
This Week’s Quiz
Test your jewelry news knowledge by answering these questions.
Take the Quiz
Graff Fontainebleau Las Vegas
MajorsMay 28, 2025
Graff Unveils New Las Vegas Flagship

The 3,300-square foot location is the jeweler's largest store in North America.

Kim Kardashian
CrimeMay 28, 2025
8 Convicted in Kim Kardashian Jewelry Heist Trial

Aging and with myriad health issues, none will serve time for their roles in robbing the billionaire celebrity at gunpoint in 2016.

antique_Vegas_2024_by_headshot_stories_9454.jpg
Brought to you by
Las Vegas Antique Jewelry & Watch Show: Showcasing the Most Collectible Merchandise from Across the Globe

Gain access to the most exclusive and coveted antique pieces from trusted dealers during Las Vegas Jewelry Week.

New York Liberty 2024 WNBA Championship Ring
CollectionsMay 28, 2025
NY Liberty’s 2024 Championship Rings Honor Historic Win

The WNBA team received rings imbued with meaning, from leaf motifs and its Liberty torch to the number of diamonds used.

Jewelers Board of Trade logo
MajorsMay 28, 2025
Andrew Rickard Named JBT President

A longtime executive at RDI Diamonds, Rickard has served on the JBT board for the past five years.

Logos for Manufacturing Jewelers & Suppliers of America and Jewelers of America
MajorsMay 27, 2025
MJSA to Become Part of Jewelers of America

The two organizations have signed an affiliation agreement that’s expected to be finalized in the coming weeks.

Al Capone Pocket Watch
AuctionsMay 27, 2025
Al Capone’s Patek Philippe Pocket Watch Back Up for Auction

The platinum and diamond watch is part of Sotheby’s upcoming Important Watches sale.

Kat Florence Lumina
AuctionsMay 27, 2025
182-Carat Paraíba-Type Tourmaline Sells for $487K

Recovered in Mozambique, “The Kat Florence Lumina” was part of Bonhams’ Hong Kong jewelry auction held last week.

Mark Henry Gumdrop Bypass Ring
TrendsMay 27, 2025
Amanda’s Style File: Candy-Colored Gemstones

Get a taste of the delicious candy-like gemstones in this Amanda’s Style File.

Stock image of police cars with their lights on
CrimeMay 23, 2025
JSA Shares Holiday Weekend Security Tips Amid Spike in Burglaries

JSA’s Scott Guginsky provided a list of nine security measures jewelers should observe while locking up for the long weekend.

Bliss Lau Bright Ring
CollectionsMay 23, 2025
Piece of the Week: Bliss Lau’s ‘Bright’ Ring

From Lau’s “Love of a Kind” series, the engagement ring was inspired by the moon and holds a different meaning depending on how it is worn.

GIA pearl report
GradingMay 23, 2025
GIA Updates Pearl Classification System

The lab has adjusted the scale it uses for nacre grading.

GCALbySarine Diamond Journey Certificate_1872x1052.jpg
Supplier BulletinMay 22, 2025
How to Put Natural Diamonds Back in the Spotlight

Sponsored by GCAL by Sarine

The late West Virginia jeweler David Ettinger
CrimeMay 22, 2025
NY Jeweler Sentenced in Shoving Death of Colleague at IJO Show

David Walton will serve three years’ probation after an incident in a hotel bar led to the death of West Virginia jeweler David Ettinger.

Watches of Switzerland store in Mall of America
FinancialsMay 22, 2025
Watches of Switzerland’s Full-Year U.S. Sales Climb 14%

The retailer also provided an update on how the tariffs situation in the U.S. is affecting its business.

Jorge Adeler, Wendy Adeler, Valentina Adeler
IndependentsMay 22, 2025
Adeler Jewelers Celebrates 50 Years

The family-owned jeweler in Great Falls, Virginia, will be celebrating its golden jubilee with a year’s worth of events.

Jose Hess Design Awards 2025 Trophy
Events & AwardsMay 22, 2025
Jose Hess Design Awards Announce Judges

The nonprofit elected five judges who will decide the winners of its design competition.

MJSA 2025-2026 Buyer’s Guide
MajorsMay 22, 2025
MJSA Releases 2025-2026 Buyer’s Guide

This year’s edition includes articles on the favorite tools of notable designers, evaluating when to outsource production, and more.

Bulgari Invisible Violet Necklace and Rainbow Flow Necklace
CollectionsMay 21, 2025
Bulgari Highlights Its Colorful Past in Phenomenal ‘Polychroma’ Collection

The jeweler’s high jewelry collection features extraordinary gemstones, like a 241.06-carat emerald and the world’s fourth-largest spinel.

Industry analyst Edahn Golan
ColumnistsMay 21, 2025
Edahn’s Take: Analyzing the 2025 ‘$100 Million Supersellers’ List

In a special column for the State of the Majors, Edahn Golan breaks down what the top-performing fine jewelry sellers are doing right.

Beyoncé bolo tie necklace
MajorsMay 21, 2025
Beyoncé Dons Brilliant Earth Necklace During Cowboy Carter Tour

The bolo tie necklace is inspired by “Queen Bey” and set with a nearly 15-carat black diamond.

Gem Legacy logo
SourcingMay 21, 2025
Gem Legacy Expands Advisory Council

The nonprofit focused on mining communities in East Africa has added three new members to its advisory council.

×

This site uses cookies to give you the best online experience. By continuing to use & browse this site, we assume you agree to our Privacy Policy