Search

Can hackers exploit your business through your supply chain?

In this blog, our partners at East Midlands Special Operations Unit (EMSOU) explain how to mitigate cyber threats that can arise from supply chains.



Bringing goods or services to market often requires some level of dependency on other organisations. These may be suppliers, manufacturers, distributors, retailers or even service providers. Collectively, these ‘supply chain’ risks, must be carefully assessed and monitored, if the enterprise is to successfully mitigate cyber security issues.

An illustrative example:

In 2013, the US retail giant Target was attacked, supposedly by a Ukrainian hacker named Andrey Hodirevski or “Profile 958,” as he was known to intelligence agencies. In all, the hacker stole 40 million credit and debit card numbers and 70 million re