Here are 5 ways you can implement good security practices for employees who work remotely.
Find out moreWhy There Has Been A Rise In Supply Chain Attacks
Supply chains can be referred to as the ecosystem of businesses and processes which are necessary to create, manufacture and distribute a product or service. They consist of a variety of assets which will help an organisation function. Examples of this include:
The rise in cyber-attacks relating to supply chains has increased dramatically with research now suggesting that up to 50% of all cyber-attacks now target supply chains. In addition to this, an ENISA report in July 2021 predicted that supply chain attacks would multiply by four times by the end of the year. Therefore, we want to explain why this could be the case.
One of the reasons supply chains have been targeted so heavily is because if the cyber-attack is successful then it can impact a wide range of businesses who rely on the supply chain to function. This can allow the cybercriminal to access a vast amount of valuable personal or financial information.
Another reason for targeting supply chains is because it is often considered to be the weakest link in the security chain therefore it is an easier target for cybercriminals. Therefore, if a cybercriminal is targeting a certain company but needs an easier way to infiltrate them then they may turn to the supply chain in order to complete their attack. The ENISA report also stated that 62% of the attacks exploit the trust of customers in their suppliers meaning it is not a typical assumption by businesses that they need security against their suppliers.
Another reason for the increase in supply chain attacks is many companies have moved to online platforms to do their work which increases the risk of them suffering a cyber-attack. There are many reasons for this, due to a lack of awareness on how the software should be set up, used and the protocols involved.
For example, many employees will instinctively set weak passwords; research conducted by SecureAUTH suggests that up to 53% of people use the same password across multiple platforms. This is a big security risk for a business. In addition to this, there could be a lack of security protocols and backup plans in place for the software used which increases the risk of a cyber-attack; as well as an extended period of recovery time due to the loss of significant data.
Insider threats can also be a reason as to why there has been an increase in cyber-attacks on supply chains. These are unlikely to happen as often as other kinds of threats, however, they are not uncommon. You cannot know all the reasons as to why someone does this although, the main motivators for this attack will include financial gain or government initiatives.
To prevent this kind of attack from occurring strict background checks on employees should be done so you can identify if there is a reason to be concerned about an employee’s behaviour. Furthermore, you could track employees’ movements online to check if they have done anything suspicious or maliciously.
Finally, insider threats can also be accidental, so it is worth training staff on the types and warning signs of cyber-attacks. This can minimise the risk of one occurring because staff will know what to look out for and will be able to mitigate the risk.
Malware can be a serious problem for supply chains because it can be hard to detect until it is too late; this is because it can be deeply hidden within legitimate apps. Malware is known as malicious software or code which can exploit vulnerabilities in unpatched, unsecured, or outdated software with the intention of causing harm to a device or a network. The ENISA report found that 62% of all attacks on supply chains rely on malware which shows this is a common issue. Examples of this include:
This is a problem because when a vast number of businesses rely on the software which is infected, all their sensitive information can be easily stolen or wiped. Every business the supply chain works with will be at risk which means the knock-on effect can be devastating for supply chains and businesses alike. The repercussions of this can be very expensive for businesses if they:
If you would like further support or guidance, contact us today:
Here are 5 ways you can implement good security practices for employees who work remotely.
Find out moreHere are 5 easy to understand signs that your phone may have been hacked.
Find out moreBlacklisting and whitelisting are two different ways of being able to filter specific types of data, to restrict...
Find out moreThe rise in cyber-attacks relating to supply chains has increased dramatically; research suggests that up to 50% of...
Find out moreReview Text
Testimonial #2 DesignationReview Text
Testimonial #3 DesignationStephen Sawley
Being partnered with WPC is a joy. Their level of service and turnaround is exceptional. As is every member of the support team that I am in contact with. Savvy support and great to work with!Mark G
We have been using Workplace Connect for around 2 years now, and have found them to be a great company to work with. The change over from our last provider was seamless, and we have enjoyed an uninterrupted service since then. They are always available to assist with any enquiries, and deal with all matters promptly. I wouldn't hesitate to recommend them to other businesses.Elliot Azim
I have worked with this company for over 4 years and can safely say that the customer service is second to none. The staff go above and beyond to assist with clients and suppliers and are always very friendly and responsive. I would highly recommend Workplace to anyone looking for a quality IT partner.Here are 5 ways you can implement good security practices…
Blacklisting and whitelisting are two different ways of being able…
Review Text
Testimonial #1 Designation