How Organizations Can Tackle Supply Chain Attacks

Share post:

Attacks on supply chains are becoming more frequent, meaning that organizations need to consider what they can do to become more resilient to attacks.

Organizations and their information security teams can protect their networks from such attacks by ensuring that infrastructures that do not need to be directly connected to the Internet are not connected.

Lindy Cameron, CEO of the National Cyber Security Centre (NCSC), explained what companies need to do: “First, organizations need to establish a clear security direction with their suppliers, asking for and incentivizing good security through the supply chain. This is often relatively straightforward security practices, such as controlling how privileged access is managed. Second, organizations should take an approach where their design is resilient if a technology supplier is compromised. The SolarWinds incident is a good example. To be blunt, if your SolarWinds installation couldn’t talk directly to the internet – which it shouldn’t have been able to do – then the whole attack was irrelevant to your network.”

Cameron said organizations need to take an approach where their design is resilient, even if a technology provider is affected, citing the SolarWinds attack as a good example.

“To be blunt, if your SolarWinds installation couldn’t talk directly to the internet – which it shouldn’t have been able to do – then the whole attack was irrelevant to your network,” she said.

For more information, read the original story in ZDNet.

SUBSCRIBE NOW

Related articles

North Korean Job Scam Targeting IT Job Seekers

North Korea’s Lazarus advanced persistent threat (APT) group has launched a sophisticated campaign, “Operation 99,” targeting freelance software...

Hackers Exploit FastHTTP in High-Speed Microsoft 365 Attacks

Threat actors are employing the FastHTTP Go library to launch high-speed brute-force password attacks on Microsoft 365 accounts...

YouTubers Targeted As Cyberattackers Hide Infostealers in YouTube Comments, Google Search Results

Attackers have found a new way to infect people seeking pirated or cracked software: planting malicious download links...

New macOS Malware Exploits Apple’s Security Features to Stay Hidden and Steal User Data

A newly discovered variant of the Banshee macOS Stealer malware is putting 100 million Apple users at risk...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways