Read Time:1 Minute, 34 Second

Threat actors are targeting supply chains more and more nowadays. Criminals infiltrate the trusted relationships between vendors and their clients to disrupt services. This type of attack is increasing and is forecasted to be a common cybercrime in the following months.

Irma Šlekytė, a writer for NordVPN, defines a supply chain attack as a kind of crime that finds the weaker links in their supply chain, like third-party vendors or suppliers, and infiltrates it by distributing malware and causing data breaches.

Šlekytė added, “if cyber criminals manage to compromise a link in the supply chain, the effects of the breach reverberate throughout the whole network, affecting everyone involved, including end users.”

Many surveys identify that supply chain attacks are becoming rampant. According to a survey conducted by BlueVoyant, a cyber defence company, 98 per cent of Asia Pacific firms have fallen victim to a cyber security breach in their supply chains.

According to CIPS journalist Andrew Allen, 62 per cent of the Asia Pacific respondents did not feel that cyber risk management was a priority. He added, “Half (52 per cent) had been negatively impacted by 2-5 cyber security breaches in their supply chain. And while only 38 per cent considered supply chain cyber risk a key priority, this was higher than the 36 per cent global average.”

BlueVoyant vice president of Asia Pacific and Japan Sumit Bansal also cited that IT leaders in the region still need to prioritise supply chain security despite many recent incidents.

Business News Daily writer Jeremy Bender recommends that although cyber attacks are inevitable, there are some steps companies can take to minimise the likelihood of it happening. Bender recommends consistently assessing third-party vendors and using a zero-trust model when dealing with these vendors. Bender also should employ security tools and, more importantly, work on creating robust incident response plans should the attack happen.

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
Previous post Closing The Gender Inequality Gap in Cybersecurity
australia and russia Next post AU Demands Russian Government To Take Action Against Cyber Criminals