How Businesses Can Prevent Supply Chain Attacks

Share post:

With ransomware attack targets shifting from individual organizations to exploiting platforms while successfully targeting thousands of victim companies, there is an urgent need to protect organizations from ransomware by hardening systems.

According to the Forrester blog, Ransomware: Survive By Outrunning The Guy Next To You, in order to protect themselves from ransomware attacks, organizations need to scrutinize the inherent trust they place on their supply chain.

Businesses can do this by taking stock of the critical partners they have in their environment, including vendors used for collaboration/email, MSPs who manage and monitor infrastructure or security vendors who may provide an agent for each system.

After that, the report recommends that organizations should take the following steps:

  • Ask these partners what they are doing to prevent the company from becoming the next victim of a destructive attack.
  • Find out if they have the proper processes and architecture to prevent the kind of lateral movement that have been seen in the recent attack
  • Check service agreements to find out what contractual responsibility these partners have to protect the company from ransomware and malware.

For more information, read the original story in ZDNet.

SUBSCRIBE NOW

Related articles

Cloudflare Launches Open Source Tool for Secure, Keyless SSH Authentication

Cloudflare has released an open-source tool called OPKSSH (OpenPubkey SSH), which allows developers and IT teams to use...

US Defence Contractor Fined 4.6 Million For Failing To Meet Cyber Security Requirements.

A U.S. defence contractor, MORSE Corp, has agreed to pay $4.6 million to settle allegations of failing to...

Tech Aide on U.S. Government Efficiency Team Linked to Cybercrime Group

A 19-year-old staffer working on the U.S. Department of Government Efficiency (DOGE) initiative has been linked to a...

Top U.S. Security Officials Have Even More Data Exposed Through Public Apps, Chats, and Data Leaks

A new investigation has revealed that personal information belonging to senior U.S. security officials — including active phone...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways