Articles

Security

John Sheehy

Eight Ways to Minimize Supply Chain Risk

Supply chain attacks aren’t anything new, but threat actors continue to find new ways to breach networks. The 2013 Target breach and more recent NotPetya, Trisis, and Wipro compromises serve as not-so-gentle reminders that supply chain attacks are damaging and costly and present many risks to both businesses and their suppliers.

Read More
Stop, Thief!

Stop, Thief!

TT Club and BSI have issued the second edition of their report on global cargo theft, the first to cover a full year. The report analyzes cargo theft by modality, theft type (modus operandi), commodities targeted, and the value of losses across the major regions of the world (see chart above). Among the notable findings: […]

Read More
Is Your IoT Deployment Secure?

Is Your IoT Deployment Secure?

Transportation and logistics companies recognize they must strengthen their approaches to cybersecurity but are not yet taking the practical steps to safeguard their industrial Internet of Things (IoT) deployments, according to a study done on behalf of Inmarsat. According to the study, which surveyed 125 businesses across the transport industry, 64% of respondents say their […]

Read More

Defending Against Supply Chain Hackers

While your company may have excellent cyber security practices in place, your suppliers may not. These best practices will help protect your company from hackers who attack your supply chain partners. 1. Review Incident Response Plans. Always make sure vendors have an incident response plan in place before conducting business with them. If there is […]

Read More

Guarding Your Business Against Data Loss

Data loss is every company’s nightmare. In fact, most companies that do experience a mass disappearance of vital, computer-kept information never turn their lights on again. It comes down to the idea that how you protect and treat your data is commensurate with how important you think it is, says Penny Garbus, co-founder of Soaring […]

Read More
10 Ways To Play IT Safe

10 Ways To Play IT Safe

State-sponsored and individual bad actors will escalate supply chain cybersecurity risks. Here are 10 threats and trends to look out for across business, governmental, and personal arenas: 1. Software updates—the new Trojan Horse. Criminals use the normal software update process to get companies to infect all their clients, which then affects everyone down their software […]

Read More
Fraud Goes Broad

Fraud Goes Broad

The use of analytics to mitigate third-party supply chain fraud, waste, and abuse risk jumped to 35 percent in 2017 from 25.2 percent in 2014,according to a Deloitte poll. Between 2014 and 2017, an average of 30.8 percent of poll respondents report at least one instance of supply chain fraud, waste, and abuse in the […]

Read More