Menu
​Why suppliers could be the weakest link in cyber security strategy

​Why suppliers could be the weakest link in cyber security strategy

“The security of your networks is often only as good as the weakest link in the system."

Cyber attackers are increasingly using their target organisation’s supply chain as a route to attack them and access their data or internal systems.

Smaller organisations throughout the supply chain often don’t have the same stringent security measures in place compared with larger organisations.

These gaps in a small supplier’s cyber defences can create weaknesses for their larger clients.

For example, criminals may use a supplier’s website to host malware - this is difficult to combat, because businesses often have to place a certain level of trust in that website or the emails coming from that supplier’s website.

“Organisations are increasingly interconnected with their suppliers and, while this provides a variety of business benefits, it also comes with security risks,” says Dr Rajiv Shah, regional general manager, BAE Systems Applied Intelligence.

“The security of your networks is often only as good as the weakest link in the system.

“You might think you understand your systems and the security measures you have in place, but how well do you know the security of your suppliers’ systems?

“Cyber criminals are very aware of these connections and are using them to access networks that are otherwise well-protected.”

Shah says there are three key ways organisations can protect themselves from the potential threats posed by a suppliers’ access to your networks, infrastructure, people or premises:

1. Written security agreements with suppliers

For Shah, the first step is to ensure clear understanding and expectations of how your suppliers protect their business and, by extension, yours.

“Where possible, organisations should make sure their suppliers adhere to certain processes and protocols that minimise the likelihood of such attack vulnerabilities, even if they don’t have the resources for high-level cyber defence technology,” Shah explains.

“A written agreement regarding these processes and protocols sets the right expectations at the start of an engagement and can be an easy first step in reducing risks when connecting with suppliers.”

2. Train your people - and theirs

One of the top ways cyber criminals gain unauthorised access to internal systems is through simple email-based methods, such as spear phishing, Shah adds.

“Attackers are now starting to use legitimate email servers, which they have compromised, to launch these campaigns, making suspect emails harder to identify,” Shah adds.

“Organisations need to educate their staff and their suppliers about how to spot suspect emails and other communications before they become a problem.”

3. Additional technology barriers between internal and external systems

Shah says attackers are known to use direct network connections from smaller vendors to get into larger target organisations.

“This trend is expected to continue over the coming years, largely because the bigger, highly-targeted organisations have a budget for cyber security that smaller players generally don’t have access to,” Shah adds.

“To protect themselves, larger organisations need to put several layers of protection between themselves and their suppliers to make sure communications from suppliers’ systems aren’t carrying malicious threats.”


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malware

Events

Why experience is the new battleground for partners

Join us for an exclusive webinar, in association with Hewlett Packard Enterprise and Technology Services Industry Association (TSIA) and learn about the latest industry insights and how technology services continue to evolve to deliver differentiated value, and how partners can be successful in 2021 and beyond.

Featured

Slideshows

Channel kicks 2021 into gear as After Hours returns to Auckland

Channel kicks 2021 into gear as After Hours returns to Auckland

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Pantry at Park Hyatt in Auckland to kick-start 2021.

Channel kicks 2021 into gear as After Hours returns to Auckland
The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

Hundreds of leaders from the New Zealand IT industry gathered at the Hilton in Auckland on 17 November to celebrate the finest female talent in the Kiwi channel and recognise the winners of the Reseller News Women in ICT Awards (WIICTA) 2020.

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards
Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards

Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards

The leading female front runners of the New Zealand ICT industry joined together for the annual Reseller News Women in ICT Awards event at the Hilton in Auckland, during which hundreds of guests celebrated 13 outstanding individuals who won awards, chosen from more than 50 finalists representing over 30 organisations.

Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards
Show Comments