By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: 5 steps to enhance supply chain security
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > 5 steps to enhance supply chain security
Tech News

5 steps to enhance supply chain security

By Viral Trending Content 9 Min Read
Share
SHARE

Contents
Choose the right partnersAccount for all APIsImplement strict access controlsVisibility and constant monitoringDevelop a robust cyber incident response planFlexible supply chain security

Mike Beevor gives his expert advice on building a resilient supply chain in the face of growing cyberthreats.

Retailers depend on their supply chain network to ensure shelves are fully stocked and customers are spoilt for choice. However, cybercriminals have become increasingly aware of the importance of these supply chains and are exploiting vulnerabilities.

Major high-street names such as the Co-op, Harrods and M&S all recently fell victim to system breaches, with the latter anticipating £300m in lost profits and disruptions to services lasting months.

The hackers behind the M&S ransomware attack are believed to have gained access via a third-party system, with social engineering tactics used to deceive unsuspecting employees and obtain login credentials.

It is clear that action must be taken to ensure retail operations remain resilient to external threats of this nature. Irrespective of supply chain complexity, steps can be taken to enforce security and mitigate the risk of data breaches.

Choose the right partners

In the context of supply chains, you’re only as strong as your weakest link.

The existence of vulnerabilities or misconfigurations can be easily exploited by cybercriminals as an entry vector to business-critical systems.

To mitigate the risk of third-party vulnerabilities, it is imperative that retailers conduct stringent vetting of the vendors and suppliers they are looking to work with.

A huge misconception when it comes to supply chain security is that the shared-responsibility model absolves retailers of culpability if a third-party breach occurs.

Accountability always lies with the retailer, and it is integral that partners comply with regulatory guidelines and maintain robust cybersecurity standards.

Vendor risk assessments provide a question-and-answer format to help retailers gauge which partners are a suitable fit based on their risk score. By prefacing any signed contract with a robust vendor risk assessment, retailers can safeguard the supply chain by ensuring that the same cybersecurity standards are exhibited across all partners, vendors and third parties.

In terms of continued compliance, suppliers should be able to provide copies of their latest security audits and be willing to co-operate with security questionnaires.

Account for all APIs

It may sound straightforward, but mapping out the supply chain is integral to enforcing supply chain security. Having a blueprint of the entire logistical operation provides retailers with the safety net that every supplier, manufacturer and distributor is accounted for.

It is often the case that third parties will operate using different systems, potentially leading to incompatibilities that disrupt the exchange of data via APIs (application programming interfaces).

By preparing a detailed plan of the supply chain, retailers can acknowledge systemic differences and help enforce data standardisation across touchpoints, ensuring the flow of secure data across the supply chain.

Because supply chains consist of millions of APIs, some of which are publicly accessible over the internet, security needs to be reinforced at a granular level.

Consistency is key to API security, and before any end user can access a remote application, they must have satisfied robust authentication and authorisation policies.

To maintain the health of applications across the supply chain, the introduction of rate limits prevents the risk of service unavailability due to oversubscribed applications.

Robust API protections elevate supply chain security by forming an effective barrier that protects data at rest and data in transit.

Implement strict access controls

It’s easy to assume that supply chain security must be airtight with little flexibility to prevent the risk of lateral movement. But security must be balanced with connectivity to ensure seamless data exchanges across physical and virtual environments.

The challenge of intricately weaving robust security processes across the supply chain can be fulfilled by implementing advanced technology frameworks.

Zero-trust architecture (ZTA) is one such framework that can help maintain connectivity and security.

A set of strategies and technologies predicated on the principle of ‘never trust, always verify’, zero trust ensures that no connection, even if it originates inside the network perimeter, can be trusted unless stringent verification measures such as multi factor authentication (MFA) and biometric validation have been satisfied.

Zero trust also streamlines supply chain security by segmenting the network and establishing a user hierarchy through ‘least privilege access’, ensuring that only users with sufficient permissions have necessary access to confidential resources, minimising the risk of systems being compromised.

Visibility and constant monitoring

Network complexity is one of the biggest challenges facing IT professionals, and this problem is exacerbated in supply chain operations. From a cybersecurity perspective, it can be difficult to identify vulnerabilities across expansive supply chains, with cybercriminals able to remain undetected and transition into persistent threats.

Transparency is crucial to maintaining supply chain security, and retailers have no shortage of strategies that can facilitate 24/7 network monitoring.

Secure access service edge (SASE) is an approach that combines networking and security capabilities into a cloud-native service. By converging networking and security functionality, SASE architecture provides a consolidated platform where retailers have full visibility over the network, facilitating holistic supply chain security.

Develop a robust cyber incident response plan

In no way meant to dissuade proactive cybersecurity measures, but such is the rate and sophistication of cyber campaigns that data breaches are inevitable. Whilst this is a foreboding reality, how well you can respond to a cyberattack speaks volumes as to the resiliency of your supply chain security.

Retailers must be prepared for the worst-case scenario and compose a well-defined cyber incident response plan (CIRP) that categorises risks based on severity levels and delineates roles and responsibilities across the entire supply chain.

A well-structured CIRP will guide IT professionals on how to counteract a data breach, limiting any damage caused.

Not only will the procurement of a CIRP ensure the swift neutralisation of identified threats, but the process of root cause analysis and thorough post-mortem investigations will ensure vulnerabilities are patched to prevent any recurrences.

Flexible supply chain security

As recent news headlines have demonstrated, retail operations have never been more exposed to cybercrime. The sophisticated tactics employed by cybercriminals can exploit existing network vulnerabilities with ease. To help fend off such threats, retailers must take a proactive approach to supply chain security that can prevent a breach from occurring in the first place.

Retailers cannot afford to rest on their laurels. Cybercriminals are constantly changing their tactics and exploring innovative ways to breach defences. Flexibility is crucial to maintaining supply chain security, and adopting these strategies can help retailers minimise exposure to cybercrime.

By Mike Beevor

Mike Beevor is chief technology officer at Principle Networks. He leads the development of the company’s technology roadmap, with a clear focus on simplifying cybersecurity and accelerating the firm’s upward trajectory. He has more than 20 years’ experience in technical security and global strategic roles across a wide range of technology organisations including start-ups, critical infrastructure, physical security and smart cities

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

You Might Also Like

Samsung Galaxy A36 Black Friday Deal Saves You £150

This Lightweight Laptop Is Almost Half Off

New SonicWall SonicOS flaw allows hackers to crash firewalls

lynx, beavers, and aurochs benefit landscapes

Dell Pro Max 18 Plus: Desktop Power in a Portable Laptop

TAGGED: cool tech, latest technology, latest technology news, new technology, science and technology, tech, Tech News, tech review, technews, technological advances, technology definition, technology reviews, what is technology
Share This Article
Facebook Twitter Copy Link
Previous Article Dreame AirPursue PM20 Review: Smarter Air for the Modern Home
Next Article Resident Evil Requiem Revisits Raccoon City Due to Capcom’s “Curiosity” of the Aftermath
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Nillion (NIL) price crashes 50% after unauthorized market-maker sell-off
Crypto
Bitcoin Long-Term Holders Keep Offloading Bags As Market Weakness Persists
Crypto
Nvidia relief won't be enough to dispel tech-bubble angst
Business
Samsung Galaxy A36 Black Friday Deal Saves You £150
Tech News
What’s causing the crypto sell-off, who is losing, and will it last?
Business
This Lightweight Laptop Is Almost Half Off
Tech News
New SonicWall SonicOS flaw allows hackers to crash firewalls
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Nillion (NIL) price crashes 50% after unauthorized market-maker sell-off

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Nillion (NIL) price crashes 50% after unauthorized market-maker sell-off
November 20, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?