Large businesses 'overlook' supplier cybersecurity risks

IT professionals question due diligence process when onboarding new suppliers

Large businesses in the UK may be overlooking vulnerabilities in their supply chain when devising their cybersecurity strategies, new research suggests.

Despite being confident in their own organisations' protections, IT security professionals are concerned that the due diligence security audits performed when taking on suppliers are insufficient, with only 35% of those questioned considering these audits to be 'very comprehensive'.

Moreover, almost one in 10 of the 750 respondents told Citrix that these checks amount to simply asking a few questions during the initial pitch, with a fifth, 20%, confirming they do not communicate with suppliers when testing their cybersecurity recovery process.

"Recent cyber attacks demonstrate that the supply chain can be the weakest link for a significant number of organisations," said Citrix's chief security architect, Chris Mayers.

"For example, the 'NotPetya' campaign began with an extremely effective supply chain attack, which had disastrous consequences for Ukraine's national bank, airport and government department - proceeding to infect machines in a staggering 64 countries.

"It is therefore vital that businesses conduct the necessary due diligence when integrating a new provider into their supply chain," Mayers added.

Despite sharing concerns around their supply chains, the vast majority of those questioned were convinced in the maturity of their own organisations' cybersecurity resilience, with 93% expressing confidence that their businesses would be able to operate effectively following an attack.

More than half of respondents felt more confident their organisation was sufficiently prepared against ransomware, and nearly two-thirds said the same about phishing, 64%, and 72% about malware, but just 49% felt the same about a distributed denial of service (DDoS) or application layer attack.

However, almost half confirmed their businesses had suffered a data breach in the last three months, with 11% admitting they'd experienced one in the last week.

"Considering the risk associated with a supply chain attack, conducting a cybersecurity audit of your supply base should not be a box-ticking exercise," Mayers continued.

"Ask yourself this question: has my business ever rejected a supplier on the basis of audit findings? I suspect this number would be significantly lower than the amount that are confident in their supplier due diligence.

"The assessment of cybersecurity procedures should be a vital part of any contractual agreement and organisations will need to ensure that they have insurance to cover their supply base. Without these measures in place, cyber criminals will use suppliers as a stepping stone to gain access to their ultimate target - your business."

Channel partners themselves should ensure they can withstand the scrutiny of tougher security audits from clients, with the risk of fines under GDPR a particularly strong reason for firms to ensure their partners' security is in good shape.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Recommended

Relay+ offers smartphone-like communication without the distraction
business communications

Relay+ offers smartphone-like communication without the distraction

23 Oct 2020
CTO job description: What does a CTO do?
Business strategy

CTO job description: What does a CTO do?

2 Oct 2020
How to delete a Facebook business page
social media

How to delete a Facebook business page

15 Sep 2020
What does a CISO do?
Careers & training

What does a CISO do?

17 Aug 2020

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
The enemy of security is complexity
Sponsored

The enemy of security is complexity

9 Oct 2020
IBM and SAP expand partnership to support software on hybrid cloud
Cloud

IBM and SAP expand partnership to support software on hybrid cloud

21 Oct 2020