Security Risks in the Supply Chain

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Security Risks in the Supply Chain-5 Next

Supply Chain Security Risk: Phishing and Whaling

Mining capabilities have become very sophisticated, Beasley points out, and this has brought an increase of phishing and whaling attempts within the supply chain. This includes attempts to acquire usernames, passwords and credit card details, and sometimes money, by masquerading as a trustworthy person in an electronic communication. "Companies should be aware of supply chain impersonation and should carefully monitor email, know who email is truly coming from, and understand there are wire transfer risks," says Beasley.

The use of Internet of Things (IoT) technologies enables retailers and manufacturers to better track their products from the beginning of the manufacturing process at their source vendors all the way through delivery to the end customers. It can alert the retailer and manufacturer of discrepancies as they happen, saving them from discovery by the retailer or customer after delivery, says Dan Mitchell, director of the Global Retail Practice at SAS.

There's no doubt that the IoT has had a profound effect on the supply chain, adds David Hood, ‎director, Technology Marketing, with Mimecast, as the ability to harness data points and apply Big Data technologies makes companies far more responsive and adaptable to shifting demand. "Collaboration inter-company has never been easier with platforms that promote sharing information, documents and key data. The challenge is doing so while still being cognizant of the security and data risks that exist."

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom's Guide. You can reach Sue via Twitter: @sueporemba

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.