SlideShare a Scribd company logo
1 of 1
Download to read offline
FOLLOW US ON
© 2017 Veritas Technologies LLC. All rights reserved.
Veritas, the Veritas Logo, and Backup Exec logo are
trademarks or registered trademarks of Veritas Technologies
LLC or its affiliates in the U.S. and other countries. Other
names may be trademarks of their respective owners.
REFERENCES:
1 Hiscox Cyber Readiness Report 2017
2 Intermedia Ransomware 101: What your business needs
to know about ransomware attacks, March 2016
BE FULLY PROTECTED
BE SURE YOU’RE BACKED UP AND READY.
Manage the risk of ransomware in 3 easy steps.
Adopting a multi-layered approach minimizes the impact of infection.
BE protected. Follow this easy 3-step strategy…
EDUCATE.
• Make sure employees know
the dangers, and know
what to do.
• Don't open suspicious-looking
emails, links or attachments.
• Especially those advising
you to enable macros.
• Beware pop-ups and software
with optional installs.
• Scan all external storage.
• Ensure desktops and laptops,
which hold 60% of corporate
data, are backed up.
PROTECT.
• Back up regularly and
frequently, including
endpoints.
• Store backups separately.
• Test and verify backups
regularly.
• Secure your backups.
And isolate them from the rest
of the network.
• Test your data recovery
capabilities.
SECURE.
• Install security software.
• Keep it up-to-date.
No exceptions.
• Ensure that OS, software and
firmware stay patched on
all devices.
• Set anti-virus and anti-malware
to auto scan and update.
• Configure access controls and
permissions appropriately.
• Automate file and backup
recovery on Windows and Mac
desktops and laptops.
Multi-layer, Mitigate and Minimize
Save today
It’s as easy as 1,2,3.
With Veritas Backup Exec™ and Veritas Desktop and Laptop
Option (DLO) all your critical data virtual, physical
cloud, AND at endpoints can be backed up.
And recovered. Quickly and easily.
We have some fantastic limited-time special
offers too. So get unified backup with Veritas.
The timing and the savings couldn’t BE better.
WannaCry, a massive coordinated
ransomware attack, struck global
organizations in May of 2017.
It targeted businesses big and small, few of
which had any idea what was about to hit them.
According to a recent report by Hiscox1
, half of all firms remain
completely unprepared ‘cyber novices’…
32%lose data access for
5 days or more after
a cyber attack2
.
20%of victims who pay
up still don’t get their
data back2
.
WHO’S THE TARGET?
Think ransomware won’t affect you? Think again.
The list of targets is growing all the time:
• Business services
• Construction
• Property
• Public sector
• Tech start-ups
• Telecoms
• Law
• Accountancy
• Finance
• Insurance
• Brokers
• Retail

More Related Content

More from Veritas Technologies LLC

VSD Paris 2018: Vertical Use Case - Manufacturing
VSD Paris 2018: Vertical Use Case - Manufacturing VSD Paris 2018: Vertical Use Case - Manufacturing
VSD Paris 2018: Vertical Use Case - Manufacturing Veritas Technologies LLC
 
VSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
VSD Paris 2018: Vertical Use Case - Banking, Finance, InsuranceVSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
VSD Paris 2018: Vertical Use Case - Banking, Finance, InsuranceVeritas Technologies LLC
 
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...Veritas Technologies LLC
 
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...Veritas Technologies LLC
 
VSD Zurich 2018: The Secret to Successful Digital Transformation
VSD Zurich 2018: The Secret to Successful Digital TransformationVSD Zurich 2018: The Secret to Successful Digital Transformation
VSD Zurich 2018: The Secret to Successful Digital TransformationVeritas Technologies LLC
 
Take Control Over Storage Costs with Intuitive Management and Simplicity
Take Control Over Storage Costs with Intuitive Management and SimplicityTake Control Over Storage Costs with Intuitive Management and Simplicity
Take Control Over Storage Costs with Intuitive Management and SimplicityVeritas Technologies LLC
 
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"Veritas Technologies LLC
 
VSD Seoul 2018: customer highlights on InfoScale
VSD Seoul 2018: customer highlights on InfoScaleVSD Seoul 2018: customer highlights on InfoScale
VSD Seoul 2018: customer highlights on InfoScaleVeritas Technologies LLC
 
VSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
VSD Seoul 2018: a Veritas customer case with Meritz Fire InsuranceVSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
VSD Seoul 2018: a Veritas customer case with Meritz Fire InsuranceVeritas Technologies LLC
 
VSD Seoul 2018: modern workload protection with NetBackup
VSD Seoul 2018: modern workload protection with NetBackupVSD Seoul 2018: modern workload protection with NetBackup
VSD Seoul 2018: modern workload protection with NetBackupVeritas Technologies LLC
 
Get your enterprise backup strategy ready for the digital world
Get your enterprise backup strategy ready for the digital worldGet your enterprise backup strategy ready for the digital world
Get your enterprise backup strategy ready for the digital worldVeritas Technologies LLC
 
Complete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil DobosComplete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil DobosVeritas Technologies LLC
 
Modernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen AlahmadModernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen AlahmadVeritas Technologies LLC
 
Cloud fundamentals, with Kevin Ashby and Brett Samuel
Cloud fundamentals, with Kevin Ashby and Brett SamuelCloud fundamentals, with Kevin Ashby and Brett Samuel
Cloud fundamentals, with Kevin Ashby and Brett SamuelVeritas Technologies LLC
 

More from Veritas Technologies LLC (20)

VSD Paris 2018: Vertical Use Case - Manufacturing
VSD Paris 2018: Vertical Use Case - Manufacturing VSD Paris 2018: Vertical Use Case - Manufacturing
VSD Paris 2018: Vertical Use Case - Manufacturing
 
VSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
VSD Paris 2018: Vertical Use Case - Banking, Finance, InsuranceVSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
VSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
 
VSD Paris 2018 - Présentation Finale
VSD Paris 2018 - Présentation FinaleVSD Paris 2018 - Présentation Finale
VSD Paris 2018 - Présentation Finale
 
Nutanix .NEXT London 2018
Nutanix .NEXT London 2018  Nutanix .NEXT London 2018
Nutanix .NEXT London 2018
 
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
 
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
 
VSD Zurich 2018: The Secret to Successful Digital Transformation
VSD Zurich 2018: The Secret to Successful Digital TransformationVSD Zurich 2018: The Secret to Successful Digital Transformation
VSD Zurich 2018: The Secret to Successful Digital Transformation
 
Take Control Over Storage Costs with Intuitive Management and Simplicity
Take Control Over Storage Costs with Intuitive Management and SimplicityTake Control Over Storage Costs with Intuitive Management and Simplicity
Take Control Over Storage Costs with Intuitive Management and Simplicity
 
VSD Zurich 2018: The Data Opportunity
VSD Zurich 2018: The Data OpportunityVSD Zurich 2018: The Data Opportunity
VSD Zurich 2018: The Data Opportunity
 
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
 
VSD Seoul 2018: customer highlights on InfoScale
VSD Seoul 2018: customer highlights on InfoScaleVSD Seoul 2018: customer highlights on InfoScale
VSD Seoul 2018: customer highlights on InfoScale
 
VSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
VSD Seoul 2018: a Veritas customer case with Meritz Fire InsuranceVSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
VSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
 
VSD Seoul 2018: modern workload protection with NetBackup
VSD Seoul 2018: modern workload protection with NetBackupVSD Seoul 2018: modern workload protection with NetBackup
VSD Seoul 2018: modern workload protection with NetBackup
 
VSD Seoul 2018: introduction
VSD Seoul 2018: introductionVSD Seoul 2018: introduction
VSD Seoul 2018: introduction
 
Get your enterprise backup strategy ready for the digital world
Get your enterprise backup strategy ready for the digital worldGet your enterprise backup strategy ready for the digital world
Get your enterprise backup strategy ready for the digital world
 
Vision Solution Day Rome 2018
Vision Solution Day Rome 2018Vision Solution Day Rome 2018
Vision Solution Day Rome 2018
 
Vision Solution Day Milan 2018
Vision Solution Day Milan 2018Vision Solution Day Milan 2018
Vision Solution Day Milan 2018
 
Complete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil DobosComplete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil Dobos
 
Modernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen AlahmadModernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen Alahmad
 
Cloud fundamentals, with Kevin Ashby and Brett Samuel
Cloud fundamentals, with Kevin Ashby and Brett SamuelCloud fundamentals, with Kevin Ashby and Brett Samuel
Cloud fundamentals, with Kevin Ashby and Brett Samuel
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Ransomware Infographic - Be Fully Protected from Ransomware Attacks

  • 1. FOLLOW US ON © 2017 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo, and Backup Exec logo are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. REFERENCES: 1 Hiscox Cyber Readiness Report 2017 2 Intermedia Ransomware 101: What your business needs to know about ransomware attacks, March 2016 BE FULLY PROTECTED BE SURE YOU’RE BACKED UP AND READY. Manage the risk of ransomware in 3 easy steps. Adopting a multi-layered approach minimizes the impact of infection. BE protected. Follow this easy 3-step strategy… EDUCATE. • Make sure employees know the dangers, and know what to do. • Don't open suspicious-looking emails, links or attachments. • Especially those advising you to enable macros. • Beware pop-ups and software with optional installs. • Scan all external storage. • Ensure desktops and laptops, which hold 60% of corporate data, are backed up. PROTECT. • Back up regularly and frequently, including endpoints. • Store backups separately. • Test and verify backups regularly. • Secure your backups. And isolate them from the rest of the network. • Test your data recovery capabilities. SECURE. • Install security software. • Keep it up-to-date. No exceptions. • Ensure that OS, software and firmware stay patched on all devices. • Set anti-virus and anti-malware to auto scan and update. • Configure access controls and permissions appropriately. • Automate file and backup recovery on Windows and Mac desktops and laptops. Multi-layer, Mitigate and Minimize Save today It’s as easy as 1,2,3. With Veritas Backup Exec™ and Veritas Desktop and Laptop Option (DLO) all your critical data virtual, physical cloud, AND at endpoints can be backed up. And recovered. Quickly and easily. We have some fantastic limited-time special offers too. So get unified backup with Veritas. The timing and the savings couldn’t BE better. WannaCry, a massive coordinated ransomware attack, struck global organizations in May of 2017. It targeted businesses big and small, few of which had any idea what was about to hit them. According to a recent report by Hiscox1 , half of all firms remain completely unprepared ‘cyber novices’… 32%lose data access for 5 days or more after a cyber attack2 . 20%of victims who pay up still don’t get their data back2 . WHO’S THE TARGET? Think ransomware won’t affect you? Think again. The list of targets is growing all the time: • Business services • Construction • Property • Public sector • Tech start-ups • Telecoms • Law • Accountancy • Finance • Insurance • Brokers • Retail