Security Risks in the Supply Chain

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Security Risks in the Supply Chain-7 Next

Supply Chain Security Risk: Lack of Encryption

Because this is highly sensitive data, it can be a big target. Most companies don't have the time and resources to properly secure it, while making sure their business users have the tools they need to be successful, explains Brady Cale, VP of Engineering at Taulia. "Companies shouldn't feel the need to take on all the responsibility for protecting against this on their own, but rather partner with organizations that are employing the top standards to keep their data safe and secure at all times," he says. "At Taulia, we do this by encrypting all data to the latest standards (AES 256) at rest and in transit. We have user-level authentication/access controls and functionality to ensure the user can only see information that is within their scope."

The use of Internet of Things (IoT) technologies enables retailers and manufacturers to better track their products from the beginning of the manufacturing process at their source vendors all the way through delivery to the end customers. It can alert the retailer and manufacturer of discrepancies as they happen, saving them from discovery by the retailer or customer after delivery, says Dan Mitchell, director of the Global Retail Practice at SAS.

There's no doubt that the IoT has had a profound effect on the supply chain, adds David Hood, ‎director, Technology Marketing, with Mimecast, as the ability to harness data points and apply Big Data technologies makes companies far more responsive and adaptable to shifting demand. "Collaboration inter-company has never been easier with platforms that promote sharing information, documents and key data. The challenge is doing so while still being cognizant of the security and data risks that exist."

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom's Guide. You can reach Sue via Twitter: @sueporemba


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.