Supply chain cyber security is only as strong as the weakest link

0
200

If you have a teenager at home, you may have come across the online game Among Us. Set on a space station, players run around as identical-looking aliens – that is, until one player gets bumped off. The remaining players then must guess which one of their fellow players is in fact a mole wreaking havoc.

An old idea with a modern makeover, the online game isn’t a million miles away from the new frontier of cyber threats: supply chain attacks. From CloudHopper to SolarWinds, businesses have seen email fraud and account compromise bring down entire systems. Most worryingly of all, businesses can no longer simply rely on their own security systems – all it takes is a cyber security chink in the supply chain for sensitive data to be leaked to criminals.

Our industry isn’t naive to the rising number of attacks capitalising on our ever-increasing interconnectivity. As businesses small and large share data and assets at scale, our collective vulnerabilities multiply, becoming more attractive targets for attackers hoping to see the dominoes fall one by one.

A primary method used by criminals to attack supply chains is impersonation, which can be remarkably sophisticated….

Read More…