Large businesses 'overlook' supplier cybersecurity risks

IT professionals question due diligence process when onboarding new suppliers

Large businesses in the UK may be overlooking vulnerabilities in their supply chain when devising their cybersecurity strategies, new research suggests.

Despite being confident in their own organisations' protections, IT security professionals are concerned that the due diligence security audits performed when taking on suppliers are insufficient, with only 35% of those questioned considering these audits to be 'very comprehensive'.

Advertisement - Article continues below

Moreover, almost one in 10 of the 750 respondents told Citrix that these checks amount to simply asking a few questions during the initial pitch, with a fifth, 20%, confirming they do not communicate with suppliers when testing their cybersecurity recovery process.

"Recent cyber attacks demonstrate that the supply chain can be the weakest link for a significant number of organisations," said Citrix's chief security architect, Chris Mayers.

"For example, the 'NotPetya' campaign began with an extremely effective supply chain attack, which had disastrous consequences for Ukraine's national bank, airport and government department - proceeding to infect machines in a staggering 64 countries.

"It is therefore vital that businesses conduct the necessary due diligence when integrating a new provider into their supply chain," Mayers added.

Despite sharing concerns around their supply chains, the vast majority of those questioned were convinced in the maturity of their own organisations' cybersecurity resilience, with 93% expressing confidence that their businesses would be able to operate effectively following an attack.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

More than half of respondents felt more confident their organisation was sufficiently prepared against ransomware, and nearly two-thirds said the same about phishing, 64%, and 72% about malware, but just 49% felt the same about a distributed denial of service (DDoS) or application layer attack.

However, almost half confirmed their businesses had suffered a data breach in the last three months, with 11% admitting they'd experienced one in the last week.

"Considering the risk associated with a supply chain attack, conducting a cybersecurity audit of your supply base should not be a box-ticking exercise," Mayers continued.

"Ask yourself this question: has my business ever rejected a supplier on the basis of audit findings? I suspect this number would be significantly lower than the amount that are confident in their supplier due diligence.

"The assessment of cybersecurity procedures should be a vital part of any contractual agreement and organisations will need to ensure that they have insurance to cover their supply base. Without these measures in place, cyber criminals will use suppliers as a stepping stone to gain access to their ultimate target - your business."

Channel partners themselves should ensure they can withstand the scrutiny of tougher security audits from clients, with the risk of fines under GDPR a particularly strong reason for firms to ensure their partners' security is in good shape.

Featured Resources

Key considerations for implementing secure telework at scale

Identifying the security risks and advanced requirements of a remote workforce

Download now

The State of Salesforce 2020

Your guide to getting the most from Salesforce

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Rethink your cybersecurity strategy for the new world

5 steps to secure the enterprise and be fit for a flexible future

Download now
Advertisement

Recommended

Amazon Contact Lens gives call center managers real-time call insight
Amazon Web Services (AWS)

Amazon Contact Lens gives call center managers real-time call insight

23 Jul 2020
What is Facebook Analytics?
analytics

What is Facebook Analytics?

10 Jul 2020
Five business benefits of hyperconvergence
data centres

Five business benefits of hyperconvergence

8 Jul 2020
What does a CISO do?
Careers & training

What does a CISO do?

20 May 2020

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

3 Aug 2020
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

4 Aug 2020
UN report points to a 350% rise in phishing websites at start of 2020
phishing

UN report points to a 350% rise in phishing websites at start of 2020

7 Aug 2020