Co-founders Afzal Imram and Lin Ruiyin brought their son’s story of a cosmic egg, toadstool, and railroad to life in their new collection.
Live from Conclave: Understanding Cybersecurity Risks
Do your employees understand when an email should raise alarm bells? And are you patching your software when prompted?
But that doesn’t mean a small business, like a family-owned jewelry store, can’t be hacked.
“Every organization is a target,” Mary Myers, an information security analyst with Jewelers Mutual Insurance Group, said. “There are just different rationales for why.”
Myers presented a breakout session Monday morning at Conclave outlining the cybersecurity risks businesses face and detailing what jewelers should do if they are hacked.
She started with social engineering and phishing.
Social engineering is the act of manipulating employees into doing something they otherwise would not do. Phishing is social engineering via email and can involve attachments, directing the recipient to fake websites, or fake emails.
Myers said phishing emails are often unexpected and written in a way that makes them seem urgent (your immediate reply is requested, etc.).
While they can contain misspellings and grammatical errors, she noted that hackers are getting smarter and cleaning up their emails so there are fewer of these. Phishing messages also can come from email addresses that are nearly identical to (or exactly the same as, which is called spoofing) those of people with whom the business owner and/or employees communicate regularly.
The emails try to bait the the receiver into replying and engaging in a conversation, opening an attachment or clicking a link for the purposes of installing malware on the business’ computer systems.
The malware widely in use by hackers right now is called ransomware, Myers said. Hackers lock victims’ computers with encryption and demand they pay a ransom, via Bitcoin, to get their data back.
Her initial recommendation is, of course, not to click on links or open the attachments in emails that seem suspicious. Delete the email, call the sender and ask if they sent that specific email with an attachment or consult IT support.
But that doesn’t always happen.
When a business owner or employee falls for a phish, Myers said options are somewhat limited.
She said what business owners should not do is pay, as there is no guarantee they will get their data back.
Jewelers also face cybersecurity risks from both employees and vendors/contractors who could accidentally load a virus onto a system by clicking a phishing link or visiting a disreputable site, or who could violate a business intentionally, by purposely loading or sending a virus or sharing sensitive customer information. Myers said business owners need to provide guidance to employees, vendors and contractors and to clearly define: what does acceptable internet use at the company look like?
While not heavily attended, the Conclave session did generate multiple questions from attendees.
One jeweler asked if should she turn off her servers at night to help protect against attacks. You can, Myers answered, but it won’t necessarily prevent anything, as some of this software is malware designed to enter the system and lie dormant until it can be activated.
Another asked if paid-for anti-virus software is better than free. Myers said anything that will help a business quarantine and clean up a virus is “great.” What will work best a particular business really depends on its size, needs and risk factors.
Myers wrapped up with a list of a half-dozen additional tips for increasing cybersecurity.
1. Keep an inventory of key systems and applications.
2. Keep an inventory of risks and threats, and use multiple layers of security.
3. Keep systems and devices patched.
All software has “gaps” that make it vulnerable to hackers, Myers said. “Patches” are released regularly by software companies and are intended to seal those gaps. Microsoft releases patches for its software on a monthly basis, but probably the most well-known example of a patch are the “updates” Apple regularly sends for iPhones and iPads.
“If you don’t close it,” Myers said of the gap, “you’re exposed. Patching is super, super critical.”
4. Back up systems and, Myers added, test the back-up.
Having a virus-infected system is going to create an “emotionally charged” situation. She said business owners don’t want that to be the first time they’ve ever walked through the process of employing their back-up.
5. Establish separation in key systems.
Business owners who host their own websites should separate it internally and not have it on the same server as the rest of their data. They also need to rotate job duties. They can’t “give the keys to the kingdom” to one person; hackers would have to have access to several people if there's separation.
Also, when someone leaves the company, take away their access to the company’s systems.
6. Train employees on cyber risks at least annually, if not quarterly.
In response to one jeweler’s question, Myers said business owners can require employees who connect personal devices to the store’s Wi-Fi to update those devices when prompted. She recommended writing it into the store’s policy.
The JSA also recently released a list of cybersecurity recommends, which was included in National Jeweler’s article about Saks getting hacked.
The Latest

The best time to prepare for the holiday season is right now, according to columnist Emmanuel Raheb.

“The Jewelry Book” comes out this September.

The Seymour & Evelyn Holtzman Bench Scholarship from Jewelers of America returns for a second year.

The company is focused on modernizing the custom jewelry buying experience with e-commerce tools like product visualization and 3D styling.


Following its recent acquisition, the storied brand has updated its leadership team and regional managers.

The 20-karat yellow gold and diamond wrap ring is modeled after the Monstera plants in the garden of the brand’s Miami villa.

The countdown is on for the JCK Las Vegas Show and JA is pulling out all the stops.

Rocksbox President Allison Vigil shared the retailer’s expansion plans, and her thoughts on opening stores in malls.

The creator of the WJA Chicago chapter is remembered as a champion for women in the jewelry industry and a loving grandmother.

The decline was consistent across age groups and almost all income groups, with tariffs and inflation still top of mind.

The “Playlist: Electric Dreams” collection brings lyrics from the musician’s song, “Little Wing,” to life through fine jewelry.

The event is set for May 16-19 in Detroit, Michigan.

The Vault’s Katherine Jetter is accusing the retailer of using info she shared for a potential partnership to move into Nantucket.

Agents seized 2,193 pieces, a mix of counterfeit Cartier “Love” and “Juste Un Clou” bracelets, and Van Cleef & Arpels’ “Alhambra” design.

The designer brought her children’s book, “The Big Splash Circus,” to life through a collection of playful fine jewelry characters.

The trade association has chosen the recipients of the funding initiative it formed to foster the growth and sustainability of the industry.

The organization has also announced this year’s slate of judges.

Associate Editor Natalie Francisco shares 20 additional pieces that stood out to her at the Couture show.

Lori Tucker started at Williams Jewelers when she was 18 years old.

The “Marvel | Citizen Zenshin” watch is crafted in Super Titanium and has subtle nods to all four “Fantastic Four” superheroes on the dial.

The “XO Tacori” collection was designed to blend luxury and accessible pricing.

Pritesh Patel, the lab’s chief operating officer, will take over as president and CEO of GIA.

National Jeweler and Jewelers of America discuss the standout jewelry trends and biggest news to emerge from the shows this year.

Signatories to the “Luanda Accord” committed to allocating 1 percent of annual diamond revenue to the Natural Diamond Council.

The winning designs captured the “Radiance” theme.

Nominations in the categories of Jewelry Design, Media Excellence, and Retail Innovation will be accepted through July 30.