Enjoy unlimited access to all forum features for FREE! Optional upgrade available for extra perks.

Is your supply chain a cyber security risk?

Acorn Newsbot

Junior Member
Joined
Jan 28, 2006
Posts
22,611
Reaction score
127
What do you think about when you consider cyber security for your own organisation? No doubt you’ll look to protect the corporate network: the systems, digital assets and datacentres that form the information backbone of your organisation. You will probably consider securing your endpoints – retail banks, for instance, often provide customers security software to help protect online banking services. But how do you go about considering the cyber security of your supply chain?

The supply chain is incredibly vulnerable to security threats and the more complex it is, the greater the vulnerability. As systems of multiple partners spread throughout diverse geographies, using different security standards, supply chains become relatively easy to interfere with and the security implications are vast.

For instance, even if untrue, the claim that China was able to install surveillance chips on a US company’s servers, which were then shipped to some of the world’s biggest brands, shows just how such a supply chain-based attack could pan out and how easy it would be to initiate a data exfiltration attack through a weak link in the supply chain. In our globalised world it’s vital that companies have deep insight into their supply chains and are able to secure them end-to-end.

Securing the supply chain


This is as true of the data supply chain as it is of the traditional physical supply chain. One of the greatest threats facing businesses is that a data breach at a supply chain partner yields data that can then be used for a sophisticated attack on their organisation. Indeed, such attacks are commonplace: organisations including Target, the IRS and Home Depot have all been victims of data breaches at third parties.

Data exfiltration is also a key concern when it comes to the data supply chain. As businesses increasingly adopt cloud services, they are, in effect, outsourcing their data management to supply chain partners. Much of this data is highly sensitive and represents a compelling target for black hat hackers. Indeed, there are documented attacks where data aggregators have been targeted through such data exfiltration techniques.

Protecting the enterprise from vulnerabilities in the supply chain is therefore a significant task. It requires all supply chain partners to coordinate their security approaches and hold themselves to appropriately high standards. It is incumbent on businesses to audit potential supply chain partners, including their cloud IT service providers, to ensure their security approaches are fit-for-purpose and that there’s adequate visibility into their processes. In a globalised system, security must be coordinated.​

The role of DNS protection


However, organisations need to take additional measures to protect themselves from attacks that leverage data stolen from supply chain partners. These attacks can fool authentication systems or be used to launch social engineering attacks. In these cases, organisations need an additional layer of protection to authenticate network traffic. It’s here that deep packet inspection at the Domain Name System (DNS) layer comes into its own. By analysing DNS data in real time, enterprises can pick up on malware, phishing attacks, data exfiltration and other security threats that might leverage weaknesses in third party systems. It will protect your core business even if there’s a breach somewhere in your supply chain.

Last year, supply chain cyber attacks increased by 200%. It seems likely that cyber criminals are increasingly aware of the vulnerabilities of supply chains and are looking to exploit them. Organisations need to immediately review their supply chain security framework, standardise it and embed the highest levels of security. And internally, businesses need to step up efforts to authenticate network traffic and identify potential attacks at speed. The race is on.

View our resources to find out more

The post Is your supply chain a cyber security risk? appeared first on Nominet.

Continue reading...
 

The Rule #1

Do not insult any other member. Be polite and do business. Thank you!

☆ Premium Listings

Sedo - it.com Premiums

IT.com

Premium Members

Latest Comments

Acorn Domains Merch
MariaBuy Marketplace

New Threads

Domain Forum Friends

Other domain-related communities we can recommend.

Our Mods' Businesses

Perfect
Laskos
*the exceptional businesses of our esteemed moderators
General chit-chat
Help Users
  • No one is chatting at the moment.
  • Helmuts @ Helmuts:
    please
    brave_qptn86fptt-png.4616
  • D AcornBot:
    DLOE has left the room.
  • Helmuts @ Helmuts:
    also, please keep the restriction in regards to posting > posting permission should be available to members only
  • Daniel - Monetize.info @ Daniel - Monetize.info:
    Welcome everyone!
  • Helmuts @ Helmuts:
    @Daniel - Monetize.info
    chrome_8fedcfysiy-png.4617
    .. can you see this one?
  • Helmuts @ Helmuts:
    nice, isn't it? :)
  • alan AcornBot:
    alan has left the room.
    • Wow
    Reactions: Jam
  • alan AcornBot:
    alan has joined the room.
  • alan AcornBot:
    alan has left the room.
  • alan AcornBot:
    alan has joined the room.
  • Helmuts @ Helmuts:
    Hi Alan
  • Helmuts @ Helmuts:
    long time no see
  • Helmuts @ Helmuts:
    hows parachute doing?
  • Helmuts @ Helmuts:
    :) huhhh.. Joe Rogan has just published an interview with Donald Trump
    To view this content we will need your consent to set third party cookies.
    For more detailed information, see our cookies page.
  • Helmuts @ Helmuts:
    almost 3 hours..
  • Helmuts @ Helmuts:
    morning all :)
  • Helmuts @ Helmuts:
    .. is anyone going to domain day in Dubai or icann Turkey?
    • Like
    Reactions: gdomains
  • boxerdog AcornBot:
    boxerdog has left the room.
  • Helmuts @ Helmuts:
    Greetings from Istanbul, Turkey!
  • alan AcornBot:
    alan has left the room.
  • C AcornBot:
    cav has left the room.
  • BrandFlu AcornBot:
    BrandFlu has left the room.
      BrandFlu AcornBot: BrandFlu has left the room.
      Top Bottom