Cybersecurity is a looming and persistent threat to supply chains, thanks to the interconnectedness of our third-party vendors and growing threats by digital terrorists.
A recent study from NCC Group shows supply chain attacks increased by 51% in the last six months of 2021. IBM reports manufacturers are the top sector for extortion by cyber terrorists via ransomware. More than half of cybersecurity breaches occur in the supply chain through third-party suppliers, with an average data breach cost of $4.46 million, according to IBM.
The National Institute of Standards and Technology (NIST) says, “Cybersecurity in the supply chain cannot be viewed as an IT problem only. Cyber supply chain risks touch sourcing, vendor management, supply chain continuity … and many other functions across the enterprise.”
What are the cybersecurity risks to supply chains, and what can you do about them?
The complexities of our ever-changing IT networks and the infrastructures of customers and suppliers make it hard for organizations to consistently apply a robust, up-to-date cybersecurity footprint, especially when there are so many risks from so many directions.
Businesses must interact regularly with other companies that supply the goods we offer customers. The same partnerships create IT security risk.
KPMG says cyber criminals can infiltrate supply chains from several different points:
NIST says supply chain cybersecurity risks stem from:
Six of the most common reasons for a data breach stemming from the supply chain include:
How confident are you that your suppliers have taken the steps necessary to eliminate these and other issues threatening your business? What steps should you take to mitigate these risks?
Understanding vendor risk is the first step toward mitigating it. Businesses can apply these generally accepted best practices to shore up their IT security:
While many of these activities focus on the business’s IT network, the steps necessary to protect the supply chain must extend to a rigorous vetting process for each of the suppliers you interact with.
An outsourced supply chain naturally creates risk. Businesses must set proactive policies to ensure each supplier doesn’t subtly undermine security shields.
This process can include looking at your supplier’s suppliers and conducting due diligence around internal controls for external vendors. For example, if the supplier has decent internal controls but does business with a company with weak internal controls, it may put both companies—and you—at risk.
Assessment questions for vendors include:
Define risk tiers for suppliers based on the importance of the product to your business and the vendor’s level of IT security controls. Establishing low, medium and high tiers will help determine the amount of risk and your approach to working with each supplier in your supply chain.
When establishing or evaluating a cybersecurity framework for your supply chain, recognize that IT security isn’t just for IT; these processes encompass people and processes as much as the hardware and software you use.
Sikich offers a cybersecurity overlay for your business that evaluates current supply chain strengths and weaknesses; we’ll help you create a roadmap to mitigate risk. Talk to one of our experts today to strengthen the links in your supply chain.
This publication contains general information only and Sikich is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or any other professional advice or services. This publication is not a substitute for such professional advice or services, nor should you use it as a basis for any decision, action or omission that may affect you or your business. Before making any decision, taking any action or omitting an action that may affect you or your business, you should consult a qualified professional advisor. In addition, this publication may contain certain content generated by an artificial intelligence (AI) language model. You acknowledge that Sikich shall not be responsible for any loss sustained by you or any person who relies on this publication.