The critical need for watertight security across the IT supply chain
Date:
Thu, 23 Jan 2025 15:07:54 +0000
Description:
As cybercrime continues to evolve in scope, the threat posed by
vulnerabilities within the IT supply chain cannot be overlooked.
FULL STORY ======================================================================
Cybercrime continues to be a major global concern. Cybercriminals are using ever more sophisticated approaches and exploiting every possible means to intercept valuable data or disrupt IT systems. Organizations targeted and impacted by these attacks, including businesses, critical entities,
governments and entire economies are being left facing serious financial consequences and operational disarray. According to estimates from Statistas Market Insights, the global cost of cybercrime is expected to surge in the
next four years, rising from $9.22 trillion in 2024 to $13.82 trillion by
2028.
One channel used by hackers that is fast becoming a key concern is the IT supply chain. Cybercriminals are exploiting vulnerabilities at third parties
of an organization's supply chain such as vendors, suppliers and logistics
and transportation companies in order to infiltrate the organizations IT systems or access physical components destined to be implemented in products. Speculation that the recent device attacks in Lebanon were the result of third-party tampering highlights the crucial need to better secure not only software supply chains but also hardware. But how much of a threat does the
IT supply chain really pose and what can be done to minimize the risks?
The weakest link
The SolarWinds cyberattack in 2020 which compromised the systems, data, and networks of thousands of organizations including the US government is the
most notorious example of a wide-scale software supply chain attack. But despite the exposure of the case and acknowledgement of the need to address
the issue of securing the supply chain, there have been numerous others.
These include attacks on Okta, Norton, 3CX, JetBrains, Airbus and Microsoft, all of which have been equally crippling to the enterprises affected. Since 2021, cyberattacks targeting supply chains have surged 431%, according to a report published last year by insurance provider Cowbell. And industry analysts see little signs of the issue abating; Gartner predicts that the
costs from these attacks will rise from $46 billion in 2023 to $138 billion
by 2031.
For organizations and enterprises, the threat of exposure to attack through
the supply chain is a major cause for concern. Unlike the full visibility and control they have over their own systems, to date organizations have had
little reassurance that their suppliers and partners have implemented the
same high standards of security . Indeed, a recent white paper published by Reuters and Cargowise, highlighted how 94% of supply chain executives were concerned about vulnerabilities in their technology stack, with 24% very or extremely concerned.
Regulators seek to bring standardized security to the supply chain
Such is the concern around the threat posed by the IT supply chain that authorities are starting to bring in regulation to curb the number of incidents. In October this year the new EU Network and Information Security version 2 (NIS2) Directive came into force. This new legislation was brought
in to establish a uniform and improved level of cybersecurity across European Union countries. Critically, along with organizations operating in sectors
such as public administrations, transport, energy, health and banking, companies supplying goods or part of IT supply chains must also adhere to
NIS2.
NIS2 will surely help to raise greater awareness of the need to secure
network infrastructure and ensure security measures are adhered to throughout the IT supply chain. However, beyond compliance with the new ruling, organizations and technology providers ultimately need to take responsibility for ensuring their prized data - and that of their customers - has the
highest level of protection against theft or system attack. But how do they
go about this?
Mitigating the risk of attack via the supply chain
Each enterprise or organization has its own unique supply chain composed of relevant third parties required to bring its specific solutions or services
to market. As such there is no one way of securing the supply chain, however there are measures that all enterprises should undertake to ensure their
supply chains - both for software and physical components or products - are
as watertight as possible, these include:
Screening suppliers: before selecting suppliers, comprehensive vetting should be undertaken to verify security practices and ensure trustworthiness
Periodic audits: Carrying out regular audits and checks on supply chain partners will ensure they are maintaining the expected security measures
SLAs: Implementing contractual security requirements with logistics providers to ensure they have appropriate security measures in place such as
tamper-proof seals on trucks
Monitoring status of goods in transit:
Technologies such as RFID and AI can help to track the location and status of goods throughout the logistics flow.
The use of Gen AI to better monitor location of hardware during transit
The integration of Gen AI into logistics operations is proving not only to
make IT hardware supply chains more effective, but also more significantly
more secure. Thanks to its ability to extract data, process and structure unstructured data, like emails, it provides an unprecedented level of visibility into the flow of goods, tracking both their location and ownership at every stage.
The integration of Gen AI means that logistics teams are always aware of
where shipments are, who is responsible for them, and can quickly respond to potential security threats even before an incident occurs. This level of insight and control is invaluable for organizations seeking peace of mind
that all elements in their supply chain are well protected at every stage of production and transfer and that they do not pose any risk of being
intercepted or tampered with.
As cybercrime continues to evolve in sophistication and scope, the threat
posed by vulnerabilities within the IT supply chain cannot be overlooked. Organizations must confront the reality that their security will only ever be as strong as the weakest link in their supply chain. New regulations such as NIS2 will be critical to ensuring an adequate and standardized approach to security across the supply chain. However, for their own peace of mind and to ensure the integrity of their products and safeguard their valuable data, organizations should look to diligently select supply chain partners, create
a culture of transparency and use advanced technologies to ensure accurate tracking and monitoring of sourced components and products. In light of the unrelenting levels of cybercrime today, investing in supply chain security
and resilience in order to protect themselves from attack is a relatively
small price to pay.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry
today. The views expressed here are those of the author and are not
necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here:
https://www.techradar.com/news/submit-your-story-to-techradar-pro
======================================================================
Link to news story:
https://www.techradar.com/pro/the-critical-need-for-watertight-security-across -the-it-supply-chain
$$
--- SBBSecho 3.20-Linux
* Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)