Red Mosquito - Blog

Supply-chain cyber-security

A supply chain is only as cyber-secure as its weakest link.  The digital transformation of the global supply chain, which has taken place over the past decade, means businesses can now work closer together than ever.  There are many benefits of integrating data and sharing information to create efficiencies while reducing costs.

However, each supplier brings a risk of introducing vulnerabilities to your network. It is worth noting that around 80% of data breaches originate in the supply chain.  Smaller organisations are often targeted and used as a vehicle for criminals to access larger corporate infrastructures. Two recent examples of this approach by cyber criminals are:

  • Equifax – US Credit Rating Company Equifax suffered a breach which resulted in the loss of over 100 million user details. The breach was blamed on a weakness introduced via their supply chain.
  • Debenhams – Suffered breach resulting in the loss over 20000 user details. The cyber-attack originated within their supply chain via the supplier of their online florist services

How to identify and address the supply chain security risks:

Risks can be introduced from various sources, for example, data can be damaged accidentally, accessed by cyber-criminals or employees who are an insider threat.

As a first step to addressing risk, you should complete an audit of your suppliers and understand who has access to which levels of your corporate data.  Once you have established who has access to what categories of your data, you can work out how to manage the risks and introduce methods of monitoring and evaluation. You can categorise suppliers and establish controls for each category.  Suppliers who provides services on-site, may form one category and will clearly bring different risks and need different controls to suppliers who provide ICT services and can access your company data. You should also consider your rules on subcontracting, consultants and partners.

Cyber –security certification options:

There is an increasing demand, within the tendering process, for suppliers to be certificated to a recognised cyber-security standard.  The following two certification routes are the most common methods of cyber security certification:

  • Cyber Essentials – The UK Government’s Cyber Essentials Scheme aims to ensure your system is protected from basic threats.  The Cyber Essentials website offers a useful search tool which will allow you to check which of your suppliers have this in place.
  •  ISO 27001 – Internationally recognised standard ISO 27001 outlines best practise for a robust Information Security Management System.  For that reason,  it requires an ongoing commitment to external audits & continual improvements to check standards are being maintained. However, there is no central database of certification.  You would need to ask for sight of certification from individual suppliers.

Our technical consultants have a strong understanding of both schemes and have supported many of our customers throughout the UK to get certification in place.   We are happy to help you work out which of the available certifications is best suited to your business needs.  Contact us if you would like to explore this further with of our experts.

 

 

Transitioning to a Managed Security Services Provider

Transitioning to a Managed Security Services Provider

The key steps considered before transitioning to a Managed Security Services Provider.

Choosing the Right Glasgow IT Support Services for Your Business

Choosing the Right Glasgow IT Support Services for Your Business

In this blog post, we will explore the key factors to consider when selecting IT support services for your business.

Boost Your Productivity with Microsoft CoPilot

Boost Your Productivity with Microsoft CoPilot

Discover how Microsoft Copilot can revolutionise your productivity and streamline your work process. From generating code snippets to providing helpful suggestions, Copilot is your ultimate assistant in achieving more in less time.

29 Jan 2024
The Importance of Data Backup and Recovery

The Importance of Data Backup and Recovery

Discover the vital role of data backup and recovery in safeguarding your valuable information.

25 Jan 2024