Page 177 - Cyber Defense eMagazine August 2024
P. 177
Organizations inherit the cybersecurity risks of their suppliers. Unfortunately, many companies do not
conduct adequate cyber risks to determine if a supplier has been breached or if there are precursors of
a breach available to the threat actor to breach the company if they elect to. This lack of involvement can
increase the risks of inheriting risks. Controlling cybersecurity risks can be increasingly more complex in
the fast-paced business world. At the same time, information security departments need more personnel
and resources to keep attackers at bay.
CTI can monitor for cyber risks in the company’s supply chain
Supply chain or third-party vendor disruptions can cause operational chaos. Specifically, if an
organization experiences unauthorized access can lead to negligence claims, significant fines, contract
disputes, potential lawsuits, loss of revenue, and even reputational harm. Therefore, companies must
secure their data by having robust vendor agreements that address data security and outline their
responsibilities in case of a breach. They also should monitor their suppliers for a potential breach that
could impact their company or customers.
Cyber Defense eMagazine – August 2024 Edition 177
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.