Skip to content
Search AI Powered

Latest Stories

Perspective

Cybersecurity and your supply chain

Properly vetting suppliers—and making data security a condition of doing business—can help reduce vulnerabilities to cyberattacks.

By now, everybody on the planet is aware that criminals have at various times hacked into the customer databases of giant retailers like Target and Home Depot, and that even government agencies—including the military—are not immune to such crimes. But what many of us don't realize is that our supply chains are also vulnerable to electronic infiltration.

As Drew Smith, founder and CEO of the computer security company InfoArmor, writes in "Is your supply chain safe from cyberattacks?" in the Q2/2015 issue of CSCMP's Supply Chain Quarterly, global supply chains are highly reliant on the rapid sharing of data among supply chain partners. Yet each of these relationships represents a potential point of access to an organization's proprietary information. Exchanging data with suppliers, it turns out, is risky business.


While Smith's article offers plenty of interesting background, such as the extent of security breaches and the most common types of attack, it's that last sentence that deserves your full attention. Today's integrated, interdependent systems, he writes, are rife with cybersecurity risks. These include the transmission of information to and from vendors; open access to data rather than "need to know" access; frequent changes in suppliers and products; a lack of standardization of security protocols among suppliers and other supply chain partners; and obsolete or infected hardware and software.

Smith argues that cybersecurity should therefore be an integral part of supplier vetting, and that every buyer should require its suppliers to meet specified security standards. "One of the most important and effective steps you can take," he writes, "is to include cybersecurity protocols, conditions, and capabilities in the procurement function's approval criteria for all potential new vendors."

The Home Depot security breach came about because criminals obtained and manipulated vendors' computer credentials. Target was compromised because a service provider failed to follow accepted information-security practices. If cybersecurity standards are not currently included among your vendor-approval criteria, I urge you to circulate Smith's article in your procurement organization, and to conduct a risk assessment soon.

Recent

More Stories

reagan national DCA airport photo

Reagan National airport plans to reopen today after deadly crash

All flights remained grounded this morning at Washington, D.C.’s Reagan National Airport (DCA) following the deadly mid-air crash last night between a passenger jet and an Army helicopter.

In a statement, DCA airport officials said they would open the facility again today for flights after planes were grounded for more than 12 hours. “Reagan National airport will resume flight operations at 11:00am. All airport roads and terminals are open. Some flights have been delayed or cancelled, so passengers are encouraged to check with their airline for specific flight information,” the facility said in a social media post.

Keep ReadingShow less

Featured

Jump Start 25 conference opens in Atlanta

Jump Start 25 conference opens in Atlanta

Artificial intelligence (AI) and the economy were hot topics on the opening day of SMC3 Jump Start 25, a less-than-truckload (LTL)-focused supply chain event taking place in Atlanta this week. The three-day event kicked off Monday morning to record attendance, with more than 700 people registered, according to conference planners.

The event opened with a keynote presentation from AI futurist Zack Kass, former head of go to market for OpenAI. He talked about the evolution of AI as well as real-world applications of the technology, furthering his mission to demystify AI and make it accessible and understandable to people everywhere. Kass is a speaker and consultant who works with businesses and governments around the world.

Keep ReadingShow less
graphic of cargo in motion

Disruption events to global supply chains rose 38% over 2023

Overall disruptions to global supply chains in 2024 increased 38% from the previous year, thanks largely to the top five drivers of supply chain disruptions for the year: factory fires, labor disruption, business sale, leadership transition, and mergers & acquisitions, according to a study from Resilinc.

Factory fires maintained their position as the number one disruption for the sixth consecutive year, with 2,299 disruption alerts issued. Fortunately, this number is down 20% from the previous year and has declined 36% from the record high in 2022, according to California-based Resilinc, a provider of supply chain resiliency solutions.

Keep ReadingShow less
chart of cargo theft in 2024

Cargo theft activity set new highs in 2024

Cargo theft activity across the United States and Canada reached unprecedented levels in 2024, with 3,625 reported incidents representing a stark 27% increase from 2023, according to an annual analysis from CargoNet.

The estimated average value per theft also rose, reaching $202,364, up from $187,895 in 2023. And the increase was persistent, as each quarter of 2024 surpassed previous records set in 2023.

Keep ReadingShow less
Study: Industry workers bypass essential processes amid mounting stress

Study: Industry workers bypass essential processes amid mounting stress

Manufacturing and logistics workers are raising a red flag over workplace quality issues according to industry research released this week.

A comparative study of more than 4,000 workers from the United States, the United Kingdom, and Australia found that manufacturing and logistics workers say they have seen colleagues reduce the quality of their work and not follow processes in the workplace over the past year, with rates exceeding the overall average by 11% and 8%, respectively.

Keep ReadingShow less