Feedback

Retail opinion

Biz Takeouts


Tune into Biz Takeouts Radio Show on 2oceansvibe Radio today at 9am with show host Warren Harding (@bizWazza). In this week's show he speaks to Louna Lohann, General Manager of Spree (@spreecoza ) and Lauren Fleiser about Trutrepreneur

Listen to the live stream in:

Subscribe to industry newsletters

Press offices

Enquire about a press office
Bizcommunity has over 400 industry contributors and we always welcome further contributions and contributors.
Advertise with us
Advertise & RatesMy Account
Company press officeList company
Recruitment packagesSubmit job ad
Download ratecard

Retail opinion

Protecting the supply chain

The theft of sensitive data, intellectual property or customer details is happening more and more often. Sophisticated cyber 'gangs' are gaining traction, and they have not only the motivation, but the ability and techniques to carry out these attacks, which are happening more and more through a business' supply chain.
Cyber thieves are coming up with new ways to steal valuable data on a daily basis. An organisation's supply chain is often the weakest link in the security chain, as many businesses do not actively scrutinise the supply chain for evidence of a breach.

© Sashkin - Fotolia.com
© Sashkin - Fotolia.com
Staggering amount of data breaches

However, more companies are keeping a closer eye on their supply chain, the task is a daunting one, as many businesses, particularly the larger entities, can have hundreds of thousands of suppliers. It is impossible to keep an eye on all these suppliers, so often a business will track only their top few dozen or so. But this is proving inadequate.

The recent breach over the festive season at international retail giant Target, is a prime example of credentials being stolen via a vendor in the supply chain. And attacks of this nature are becoming commonplace.

According to Agiliance, approximately 80% of data breaches start in the supply chain, a staggering figure.

As businesses invest in more and more of the latest security technologies to strengthen their defences against cyber attacks, criminals look for more and more ways to successfully breach them. An organisation might have the best security measures in place, but unfortunately, they are only as strong as their weakest link, and too often, this is the supplier. The supplier has become the path of least resistance.

Protect from attacks

This is particularly effective as it is no easy task to conduct a risk assessment across a multitude of suppliers, but that there are ways to protect the supply chain from attacks.

Firstly, be prepared. It is vital to identify your most sensitive and desirable information, your compliance environment and your current ability to protect them. With this knowledge, a company can formulate strategies and tactics to help them address risk based on what is a priority. This can also help to identify what extra awareness or skills might be needed among staff. Formulate your policies around security, and make sure your staff and supply chain are aware of them.

Next, monitor systems and networks for signs of any suspicious or anomalous activity. In addition, keep an eye on emerging trends, the external environment and shifting business requirements. Measure the effectiveness of your cyber security tools and capabilities.

Have a response plan

In terms of protection, formulate and deploy security solutions that address the risk, and ensure the integrity of the sensitive information, but that are not so tight and cumbersome as to disrupt the business. Apply solid engineering processes to the design and development of security measures to ensure they integrate properly with business operations.

Another important factor, which is often overlooked, is response. Having a response plan in place is vital. Without one, it is impossible for a business to gauge its ability to not only contain, but to mitigate and recover from a breach.

Finally, education of staff, as always, is paramount. It is too easy to invest a fortune in technologies, but overlook the human factor. Staff must understand the implications of a breach, and know which information they handle is sensitive. Once staff understand the consequences, and the role they have to play in securing the business, this will go a long way towards keeping risk at a minimum.
    
 

About Jayson O'Reilly

Jayson joined DRS in November 2012 after being in the vendor community for over 12 years. His experience and exposure to industry experts and global customers have allowed him the opportunity to get involved at the grass roots where it matters most.
LEGAL DISCLAIMER: This Message Board accepts no liability of legal consequences that arise from the Message Boards (e.g. defamation, slander, or other such crimes). All posted messages are the sole property of their respective authors. The maintainer does retain the right to remove any message posts for whatever reasons. People that post messages to this forum are not to libel/slander nor in any other way depict a company, entity, individual(s), or service in a false light; should they do so, the legal consequences are theirs alone. Bizcommunity.com will disclose authors' IP addresses to authorities if compelled to do so by a court of law.

News