Compliancechannel
click to search
search type


 
  • Home
  • Your Story
    • Create Your Story
    • License Your Story
    • Pitch Your Story
    • Quizz Your Story
  • Best Practice
  • Knowledge
    • Explain Compliance
    • Studies & Whitepapers
    • Compliance Reader
  • 1 on 1
  • Spotlight On
    • 10 Years Compliance Channel
    • PODCAST: Compliance Channel TALK
    • Events
    • Feature
    • Ethics & Compliance Panel
    • CSTV
  • Ethics & Compliance Leaders
  • Newsroom
    • Daily News
    • #Untited4Integrity 2024
    • #Untited4Integrity
    • DICO inside
    • Corporate Culture Award Special
  • About Us
    • Mission
    • Partners
    • Testimonials
    • Contact Us
Menu
  • Home
  • Your Story
    • Create Your Story
    • License Your Story
    • Pitch Your Story
    • Quizz Your Story
  • Best Practice
  • Knowledge
    • Explain Compliance
    • Studies & Whitepapers
    • Compliance Reader
  • 1 on 1
  • Spotlight On
    • 10 Years Compliance Channel
    • PODCAST: Compliance Channel TALK
    • Events
    • Feature
    • Ethics & Compliance Panel
    • CSTV
  • Ethics & Compliance Leaders
  • Newsroom
    • Daily News
    • #Untited4Integrity 2024
    • #Untited4Integrity
    • DICO inside
    • Corporate Culture Award Special
  • About Us
    • Mission
    • Partners
    • Testimonials
    • Contact Us
Supply chain cyber security is only as strong as the weakest link

Supply chain cyber security is only as strong as the weakest link

15-09-2021

A spate of high-profile cyber attacks has highlighted the criticality of supply chain security and put new pressures on security leaders. How can we ensure that cyber security remains robust down the full length of supply chains?

If you have a teenager at home, you may have come across the online game Among Us. Set on a space station, players run around as identical-looking aliens – that is, until one player gets bumped off. The remaining players then must guess which one of their fellow players is in fact a mole wreaking havoc.

An old idea with a modern makeover, the online game isn’t a million miles away from the new frontier of cyber threats: supply chain attacks. From CloudHopper to SolarWinds, businesses have seen email fraud and account compromise bring down entire systems. Most worryingly of all, businesses can no longer simply rely on their own security systems – all it takes is a cyber security chink in the supply chain for sensitive data to be leaked to criminals.

Click here to read the full article

     

  • Impressum
  • Disclaimer-Data Privacy
  • AGB
Menu
  • Impressum
  • Disclaimer-Data Privacy
  • AGB

© Compliancechannel 2025. ALL RIGHTS RESERVED.