Supply chain attack. What is it and how do you defend yourself?

A supply chain attack is a type of cyber attack that exploits a vulnerability in the service provider (supplier) to penetrate the organization it serves.

There are a variety of ways to reduce the risk, below is a list that will definitely reduce the risk:

  • Risk assessment: It is important to conduct a risk survey of the service provider to ensure that it meets adequate security requirements.
  • Security controls: The ways of connecting to the computing environment that are made after setting an acceptable standard, such as encryption, two-step verification and security audits, must be verified.
  • Monitoring and updating systems regularly: It is recommended to implement measures that will allow monitoring of suspicious actions, such as session recording systems.

Also, make sure that the systems are continuously updated under an orderly procedure.

  • Response to the event: It is important to build a response plan that will make it possible to reduce the harm as much as possible in the event of an incident, steps to isolate and contain the attack and who the factors should be reported to.
  • awareness: It is important to teach the employees about the dangers that exist in the supply chain attack and who they report to in case of suspicion.
  • limited access: It is important to make sure that the access given to that provider is given according to its specific needs.
  • Encryption and secure protocols: It is important to ensure that all data transmissions are encrypted and use secure protocols, such as HTTPS or SFTP.

The supply chain attack is very common and it is important to consider this issue.

Author: Zabri Idan, VP of expert services and information security at Genie

You may be interested in: