Check Point Software Technologies, a global provider of cyber security solutions outlines how to protect your organization from a supply chain assault, citing supply chain as one of the primary targets for cybercriminals. Although this trend is down to a number of factors, one of the most important is, undoubtedly, the cyber pandemic.
According to Check Point Software Technologies, COVID-19 has clearly transformed the modern workplace, forcing many to remote working and cloud adoption when they may not have been completely prepared. As a result, security staff is overburdened and unable of keeping up.
“Supply chain attacks aren’t new but throughout last year they rapidly increased in size, sophistication and frequency, In other words, there was a 650% global increase in supply chain attacks. In a digital landscape that’s increasingly made up of complex interconnections between suppliers, partners and customers, the risk of vulnerability is increasing exponentially and businesses cannot afford to settle for second-best security,” explains Ram Narayanan, Country Manager, Check Point Software Technologies, Middle East.
Last year’s high-profile supply chain assaults included SolarWinds, where attackers gained access to the company’s production environment and placed a backdoor in updates to its Orion network monitoring product.
Another case in point is the REvil ransomware gang, which used Kaseya, a software firm that provides software for managed service providers (MSPs), to infect over 1,000 clients with ransomware.
The cybercriminals also demanded a $70 million ransom to supply decryption keys to all impacted individuals.
“The cost of ransomware and remediation can run into the millions, yet it is something that can be avoided by taking a proactive approach to security and having the right technology in place to prevent malware from getting into the network in the first place,” Narayanan added.
A supply chain assault, according to the company, takes advantage of the trusted ties that exist between various organisations. As a result, cyber criminals target a company with strong cyber security but an untrustworthy supplier. Attackers who have a footing in that provider’s network can utilise that link to relocate to a more secure network.
Check Point Software Technologies has highlighted the best approaches for detecting and mitigating supply chain threats in a recent publication.
Despite the danger posed by this threat, there are methods for protecting a business: