Page 177 - Cyber Defense eMagazine August 2024
P. 177

Organizations  inherit  the cybersecurity  risks  of their suppliers.  Unfortunately,  many companies  do not
            conduct adequate cyber risks to determine if a supplier has been breached or if there are precursors of
            a breach available to the threat actor to breach the company if they elect to. This lack of involvement can
            increase the risks of inheriting risks. Controlling cybersecurity risks can be increasingly more complex in
            the fast-paced business world. At the same time, information security departments need more personnel
            and resources to keep attackers at bay.



            CTI can monitor for cyber risks in the company’s supply chain

            Supply  chain  or  third-party  vendor  disruptions  can  cause  operational  chaos.  Specifically,  if  an
            organization  experiences unauthorized  access can lead to negligence claims, significant fines, contract
            disputes,  potential  lawsuits,  loss  of revenue,  and even  reputational  harm. Therefore,  companies  must
            secure  their  data  by  having  robust  vendor  agreements  that  address  data  security  and  outline  their
            responsibilities  in case of a breach. They also should monitor their suppliers  for a potential breach that
            could impact their company or customers.























































            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          177
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   172   173   174   175   176   177   178   179   180   181   182