72/100
overall score
Total issues found:
179702Updated on: November 17, 2025
Data we analyse
Phishing and malware
178015
issues
Network security
25
issues
Email security
0
issues
Website security
1662
issues
Recent critical risk issues we found
7861 corporate credentials stolen
1646 SSL configuration issues found
4 critical vulnerabilities found
4 high-risk vulnerabilities detected
What information we check
Software patching
Web application security
Email security
Dark web exposure
Cybersecurity Benchmark
A comparison of this company’s cybersecurity ranking with industry averages and peer organizations
Phishing and malware
0
vs.
34
Network security
99
vs.
98
Email security
100
vs.
93
Website security
75
vs.
75
Get Your Free Report
Need help in fixing issues? Contact us and we will help you prepare an action plan to improve your risk rating.
Company overview
Section 1: Company OverviewNordstrom is a major U.S.-based specialty retailer, operating full-line department stores, Nordstrom Rack outlets, and extensive e-commerce channels. Serving millions of customers, the company handles high volumes of payment transactions, loyalty program data, and personally identifiable information (PII) across physical stores and digital platforms. As a prominent player in retail, Nordstrom must meet payment card industry (PCI) standards, state and federal privacy requirements, and consumer expectations for secure handling of financial and personal data.
Section 2: Historical Data Breaches
The material provided did not attribute any specific, confirmed historical breaches directly to Nordstrom. In the retail sector more broadly, however, attackers commonly target point-of-sale systems, third-party vendors, and online checkout flows; these vectors are relevant to any omnichannel retailer. Absent verified incident reports for Nordstrom in the description, the company should still be treated as operating in a high-risk environment due to the sensitivity and volume of data it processes, and because retail ecosystems often inherit risk from partner integrations and legacy infrastructure.
Section 3: Recent Security Breach
(omitted — no Nordstrom-specific recent breach details were supplied in the description)
Section 4: Evaluation of Digital Security
An external assessment supplied with the brief (SerityData) shows a security posture that requires substantive remediation. Key findings attributed for the organization under review include:
- Phishing and malware exposure: Approximately 1,000 vulnerabilities were identified in defenses against socially engineered attacks and malicious software. This suggests gaps in email filtering, endpoint protection, or user awareness that could allow credential theft or lateral movement.
- Network security: At least one network-level issue was noted. While a single finding might not be critical by itself, it is indicative of incomplete hardening and should be treated as part of a broader remediation plan.
- Web/TLS configuration: The analysis highlighted roughly 1,866 website-related problems, including a large number of SSL/TLS misconfigurations. Weak or incorrectly implemented TLS can expose session data, enable downgrade attacks, or undermine customer trust in online transactions.
- Credentials and password hygiene: The report found substantial credential compromise — tens of thousands of corporate credentials surfaced in collections of breached data, with an estimated 15% of employees reusing passwords previously exposed. Credential reuse greatly increases the probability of account takeover and data exfiltration.
- Aggregate security score: A composite score near 71/100 was reported, placing overall security below recommended benchmarks and signaling material room for improvement.
Taken together, these findings point to a mid-to-high operational risk profile. Retailers like Nordstrom—because of large customer bases, payment processing, and third-party integrations—are attractive targets; the combination of TLS weaknesses, credential exposure, and phishing gaps is particularly concerning. The presence of many website and SSL problems implies that attack surfaces tied to customer-facing services could be exploited to intercept transactions or harvest credentials. Compromised employee credentials further elevate the risk of internal account compromise or fraud.
Recommended immediate actions
- Rotate exposed credentials and enforce mandatory multi-factor authentication (MFA) across all employee and administrative accounts.
- Patch and remediate the most severe SSL/TLS and web-application misconfigurations; adopt automated TLS monitoring and strict cipher-suite policies.
- Run targeted phishing simulations and bolster email defense (DMARC/DKIM/SPF, advanced threat protection) and endpoint detection and response (EDR) controls.
- Conduct a prioritized vulnerability remediation sprint driven by risk and exposure, with compensating controls for systems that cannot be immediately fixed.
- Audit third-party integrations and contractually require secure practices from vendors processing customer data.
Longer-term recommendations
- Implement a continuous security monitoring program (SIEM/SOAR) and a mature incident response playbook with tabletop exercises.
- Strengthen identity and access management (IAM) with least-privilege principles and regular entitlement reviews.
- Expand application security (SAST/DAST) and secure SDLC practices for customer-facing services.
- Invest in PCI and privacy-focused compliance assurance, and maintain transparent external reporting to preserve customer trust.
Conclusion: Is Nordstrom Safe?
Nordstrom operates in a high-risk retail environment and, based on the supplied evaluation data, its security posture shows notable weaknesses—especially around website/TLS configuration, phishing resilience, and compromised credentials. Immediate steps—MFA enforcement, credential rotation, TLS remediation, and enhanced monitoring—are essential to reduce exposure. Addressing these gaps will limit financial, reputational, and privacy fallout and should be treated as an urgent business priority.
(About 530 characters) Immediate mitigation is critical: enforce organization-wide MFA, remediate exposed web/TLS issues, rotate compromised credentials, and harden email/endpoint defenses. Parallel investments in continuous monitoring, vendor security controls, and incident response will reduce risk and protect customer data, brand value, and regulatory standing.
Details
Website:
Industries:
Retail & eCommerce
Company size:
10,001+ employees
Founded:
1901
Headquarters:
1600 7th Ave; Seattle, Washington 98101, US
Outcome reliability
We analyze billions of signals from publicly available sources to deliver validated insights into how your company is perceived externally by threat actors. These insights help security teams respond more quickly to risks, manage zero-day incidents effectively, and reduce overall exposure.