• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Compliance, IT Infrastructure, Network Security, News

Supply Chain Attacks Highlight Why You Should Continue to Be Careful with Third-Party Providers

New attacks, growing public awareness, and increased oversight from regulators is highlighting the growing trend of supply chain attacks.

November 4, 2021 Chris Martin Leave a Comment

Proofpoint CISO, CISOs cyberattack
Gorodenkoff/stock.adobe.com

It is nearly one year since we saw a nation-state attack on the SolarWinds network management system that compromised the supply chains of over 18,000 organizations, including the Pentagon and the Department of Homeland Security. With costs likely to run into the billions, the breach was one of the biggest incidents in recent years with costs likely to run into billions of dollars. Sadly, the Kaseya VSA supply chain attack in July further highlighted that these types of attacks will not be the last and increase in frequency.

What is a supply chain attack? And why we should care

A supply chain attack, also called a value-chain or third-party attack, occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data. This has dramatically changed the attack surface of the typical organization in the past few years, with more suppliers and service providers touching sensitive data than ever before.

New types of attacks, growing public awareness of the threats, and increased oversight from regulators is highlighting this growing trend. This means businesses and governments must do everything in their power to keep its supply chains running smoothly, or they risk losing sensitive data and harming your business’ reputation and potentially resulting in operational downtime, financial losses, legal action, and regulatory fines.

Motivations and the biggest threats

Supply chain attacks are attractive to hackers because when commonly used software is compromised, the attackers can potentially gain access to all the enterprises that use that software.

Below are three of the biggest supply chain security threats that organizations and governments need to be aware of:

  1. Data Protection

Data is an essential tool in keeping any business running. But it is also equally important to protecting your data from breaches and attacks. Data protection is vital in certain industries such as health care, fintech and ecommerce, but with these industries ever growing and profitable, attackers and bad actors have plenty of incentive to launch attacks.

  1. Data Governance

As we live in a post pandemic world, we are seeing more companies adopt remote working and encourage their employees to talk via project management software and mobile apps. So, the surface area the business must oversee has become larger. Organizations must use best practices for handling threats and enforce new standards on how their employees and suppliers’ access and share data.

       3. Third-Party Risk

Everyday products like computers, mobile phones and even cars are growing more complex, as are software solutions that incorporate multiple cloud services. They may require four or more supplier tiers to reach the finished solution or product. Although better products are good for the market, working with external partners also increases the risk to the supply chain.

How to Prevent Supply Chain Attacks

Last year’s SolarWinds Orion data breach not only demonstrated the devastating potential of supply chain attacks, but it also exposed concerning vulnerabilities in conventional defence methods that make such attacks possible. Even though the SolarWinds breach was one of the most sophisticated cyberattack in history, there are still tactics and best practices that an organisation can implement to significantly strengthen the digital supply chain. So, what are these steps?

Minimize access to sensitive data

First, all the sensitive data access points need to be identified. This will help you note all the employees and vendors that are currently accessing your sensitive resources. The higher the number of privileged access roles, the larger the privileged access attack surface, so such accounts need to be kept to a minimum. Vendor access should be especially scrutinized given their risk of being the first targets in a supply chain attack.

  • Map out all the vendors currently accessing your sensitive data and their respective access levels.
  • Questionnaires will help flesh out how each vendor processes and protects your sensitive data.
  • Once all third-party access data is acquired, the culling process can begin. Service providers should only have access to the minimal amount of sensitive data they require to offer their services.

Implement strict shadow IT rules

Shadow IT refers to all IT devices that are not approved by an organization’s security team. The recent global adoption of a remote-working model due to COVID-19 has resulted in many employees incorporating their own private IT devices while establishing their home office environments.

IT security departments should enforce the registration of all IT devices alongside strict guidelines about what can and cannot be connected. All permitted devices (especially IoT devices) should be monitored to identity DDoS attacks being launched from the supply chain.

Third-party risk assessments

The sad reality is that many vendors are unlikely to ever take cybersecurity seriously. Therefore, it’s up to the organisation to ensure its supply chain is well defended. Third-party risk assessments help disclose each vendor’s security posture and any concerning vulnerabilities that need remediating.

Policy Monitoring

Monitoring the development of cybersecurity policies in key markets to identify current and upcoming compliance requirements, best practice guidance, and regulatory barriers will help to identify and prepare for upcoming issues. These would include domestic standards, security policies and certifications and export and import requirements.

Data Protection and Privacy

Alongside working with data loss prevention and security tools. Seeking guidance on monitoring and driving the outcomes of public policy debates and implementing strategies and polices in key markets form an important strategy for governments and businesses.

Standards Development

Many organizations should look at advocating for cybersecurity standards in regional and international bodies, including the EU, the ITU and the European Telecommunications Standards Institute (ETSI). Setting the right standards that fit the reality of the cybersecurity environment across various products and services is critical.

Procurement

Alongside promoting the adoption of cybersecurity technologies, policymakers need to play a part in guiding the development of rules for government procurement of these technologies in various markets worldwide, such as the EU, Canada, the US, Japan and India. In this way, governments can lead by example.

No silver bullet

In the wake of these significant incidents, time will tell what further fallout we may be seeing in 2022. The reliance on third parties is not going away anytime soon as businesses outsource expertise to save time and money. As more diverse services come online and businesses expand, the attack surface for any organization will likely grow.

Although there is no silver bullet to help organizations, these organizations can take a multi-layered approach to addressing this issue. Good data hygiene practices, proactive measurements and policy oversight can combat against impacts of damaging supply chain attack.

Christopher Martin leads Access Partnership’s office in Singapore and manages operations in the Asia Pacific. Consulting on information and communications technology policy, he works with global companies and organizations to develop strategies, shape policy discussions, and access new markets

 

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.