Red Mosquito - Blog
Supply-chain cyber-security
A supply chain is only as cyber-secure as its weakest link. The digital transformation of the global supply chain, which has taken place over the past decade, means businesses can now work closer together than ever. There are many benefits of integrating data and sharing information to create efficiencies while reducing costs.
However, each supplier brings a risk of introducing vulnerabilities to your network. It is worth noting that around 80% of data breaches originate in the supply chain. Smaller organisations are often targeted and used as a vehicle for criminals to access larger corporate infrastructures. Two recent examples of this approach by cyber criminals are:
- Equifax – US Credit Rating Company Equifax suffered a breach which resulted in the loss of over 100 million user details. The breach was blamed on a weakness introduced via their supply chain.
- Debenhams – Suffered breach resulting in the loss over 20000 user details. The cyber-attack originated within their supply chain via the supplier of their online florist services
How to identify and address the supply chain security risks:
Risks can be introduced from various sources, for example, data can be damaged accidentally, accessed by cyber-criminals or employees who are an insider threat.
As a first step to addressing risk, you should complete an audit of your suppliers and understand who has access to which levels of your corporate data. Once you have established who has access to what categories of your data, you can work out how to manage the risks and introduce methods of monitoring and evaluation. You can categorise suppliers and establish controls for each category. Suppliers who provides services on-site, may form one category and will clearly bring different risks and need different controls to suppliers who provide ICT services and can access your company data. You should also consider your rules on subcontracting, consultants and partners.
Cyber –security certification options:
There is an increasing demand, within the tendering process, for suppliers to be certificated to a recognised cyber-security standard. The following two certification routes are the most common methods of cyber security certification:
- Cyber Essentials – The UK Government’s Cyber Essentials Scheme aims to ensure your system is protected from basic threats. The Cyber Essentials website offers a useful search tool which will allow you to check which of your suppliers have this in place.
- ISO 27001 – Internationally recognised standard ISO 27001 outlines best practise for a robust Information Security Management System. For that reason, it requires an ongoing commitment to external audits & continual improvements to check standards are being maintained. However, there is no central database of certification. You would need to ask for sight of certification from individual suppliers.
Our technical consultants have a strong understanding of both schemes and have supported many of our customers throughout the UK to get certification in place. We are happy to help you work out which of the available certifications is best suited to your business needs. Contact us if you would like to explore this further with of our experts.
Understanding the Microsoft Outages: What You Need to Know
Explore the recent Microsoft outages, their impact on services, and what steps you can take to mitigate such disruptions.
Crafting a Robust Disaster Recovery Plan for SMEs
Discover how to shield your SME from catastrophic data losses with a comprehensive disaster recovery plan.
AI Revolution: Transforming UK Businesses with Microsoft Copilot
Explore the transformative power of Microsoft Copilot in revolutionising UK businesses and driving growth and efficiency.
Best Practices for Effective Cyber Security Assessments
Explore the essential best practices for conducting effective cyber security assessments to protect your organisation from potential threats and vulnerabilities.