• Advertise
  • Contact Us
  • About Us
  • Supplier Directory
  • SCB YouTube
  • Login
  • Subscribe
  • Logout
  • My Profile
  • LOGISTICS
    • Air Cargo
    • All Logistics
    • Express/Small Shipments
    • Facility Location Planning
    • Freight Forwarding/Customs Brokerage
    • Global Gateways
    • Global Logistics
    • Last Mile Delivery
    • Logistics Outsourcing
    • LTL/Truckload Services
    • Ocean Transportation
    • Rail & Intermodal
    • Reverse Logistics
    • Service Parts Management
    • Transportation & Distribution
  • TECHNOLOGY
    • All Technology
    • Artificial Intelligence
    • Cloud & On-Demand Systems
    • Data Management (Big Data/IoT/Blockchain)
    • ERP & Enterprise Systems
    • Forecasting & Demand Planning
    • Global Trade Management
    • Inventory Planning/ Optimization
    • Product Lifecycle Management
    • Sales & Operations Planning
    • SC Finance & Revenue Management
    • SC Planning & Optimization
    • Sourcing/Procurement/SRM
    • Supply Chain Visibility
    • Transportation Management
  • GENERAL SCM
    • Business Strategy Alignment
    • Education & Professional Development
    • Global Supply Chain Management
    • Global Trade & Economics
    • HR & Labor Management
    • Quality & Metrics
    • Regulation & Compliance
    • SC Security & Risk Mgmt
    • Supply Chains in Crisis
    • Sustainability & Corporate Social Responsibility
  • WAREHOUSING
    • All Warehouse Services
    • Conveyors & Sortation
    • Lift Trucks & AGVs
    • Order Fulfillment
    • Packaging
    • RFID, Barcode, Mobility & Voice
    • Robotics
    • Warehouse Management Systems
  • INDUSTRIES
    • Aerospace & Defense
    • Apparel
    • Automotive
    • Chemicals & Energy
    • Consumer Packaged Goods
    • E-Commerce/Omni-Channel
    • Food & Beverage
    • Healthcare
    • High-Tech/Electronics
    • Industrial Manufacturing
    • Pharmaceutical/Biotech
    • Retail
  • THINK TANK
  • WEBINARS
    • On-Demand Webinars
    • Upcoming Webinars
    • Webinar Library
  • PODCASTS
  • VIDEOS
  • WHITEPAPERS
Home » Blogs » Think Tank » Your Supply Chain Data Is Showing, and Hackers Are Getting an Eyeful

Think Tank
Think Tank RSS FeedRSS

Your Supply Chain Data Is Showing, and Hackers Are Getting an Eyeful

December 4, 2018
Marc Iannarino, SupplyChainBrain and Ralph Henderson, SupplyChainBrain

Next-gen supply chains will create and use massive amounts of data to connect companies with every stage of their supply chain process. Suddenly, we’ve become more attractive to hackers.

We're entering an era where cybersecurity is critical to every business and all forms of data. Increased security measures will be the only way to gain the trust of customers and vendors in a digital, global economy. 

More than 1,500 data breaches occurred in 2017, and 55% of them were in the business sector.

Artificial intelligence, robotics, cloud storage, in-house applications, and mobile devices all have weak points wherever they intersect. New security procedures, training, software updates, and monitoring will be necessary to protect valuable public and private data.

The National Counterintelligence and Security Center warns that hackers will target supply chains for the purpose of cyber espionage, business disruption, or economic impact. They can infiltrate your network system to steal all kinds of useful data:

  • Employees’ personal information 
  • Corporate financial data
  • Intellectual property 
  • Operational or contractual information
  • Shipping times and delivery locations of products

Once cybercriminals are inside the network, they can reach remotely accessed mobile devices, find holes in cloud-based infrastructures, and imitate authorized credentials and passwords. To avoid this, you will need multiple security layers between the user and the data on the web, network, application, and database that require authentication of identity and permission to access. Please don’t hire Inspector Clouseau to do the job of James Bond.

Let’s not forget, information will also be transmitted by the internet of things (IoT) sensors on pallets, containers, conveyor belts and driverless vehicles. These new automated devices are constantly sending information requiring various security certificates.

Stupid Mistakes

Unfortunately, deliberate data breaches aren’t the only threat to your data. Employee and distributor error can also leave data open to attack. Lost or stolen equipment, the unintentional opening of a viral email, or an unprotected vendor connection are all opportunities for an attack that can lead to:

  • Business interruption 
  • Employee downtime
  • Costly data reconstruction 
  • Damaged reputation in the industry and among consumers

Your IT department or service provider should continually monitor your network system to identify all access points to data using security system software in a virtual protected network (VPN) containing your equipment, servers, and third-party apps. 

Other security tools are used to detect any changes to normal network activity or inappropriate access. They can identify dangerous proxy servers or links and block their access. When a potential data breach is found, it's reported right away. A hacked VPN or VLAN can be isolated from the rest of the network and an incident response plan can begin. 

What Is an Incident Response Plan?

This plan creates written guidelines about the types of security breaches and how to respond to them. It establishes a communication channel for reporting the incident to internal staff and outside authorities. It trains and prepares employees how to secure the computers, servers, and network systems right away. Incident Response Plans are regularly updated and developed according to the threat level in your business and industry. 

High-risk industries include:

  • Communications
  • Energy 
  • Financial 
  • Healthcare and Medical
  • Information Technology
  • Manufacturing

Security procedures should be part of your employee onboarding and vendor contracts to create a new data-security culture. Protect your private areas from the roaming eyes of cyber saboteurs. 

Sources:

Jackson, S., 2017. Data Breach Year-End Review. Identity Theft Resource Center® and CyberScout®. www.idtheftcenter.org/2017-data-breaches/

Calvo, S., 2018. 7 Threats to Your Data Security, Current Features, Technology, https://www.mhisolutionsmag.com/index.php/2018/09/13/7-threats-to-your-data-security/

RELATED CONTENT

RELATED VIDEOS

Subscribe to our Daily Newsletter!

Timely, incisive articles delivered directly to your inbox.

Popular Stories

  • A PERSON HOLDS UP A TABLET COMPUTER IN A WAREHOUSE, SUPER-IMPOSED BY A GRAPHIC SHOWING A COMPLEX WEB OF SUPPLY CHAIN ELEMENTS

    Three Post-Pandemic Actions for Repairing Global Supply Chains

    Data Management (Big Data/IoT/Blockchain)
  • A MAN IN A SUIT SHAKES HANDS WITH A WOMAN IN A HARD HAT, NEXT TO A STACK OF CONTAINERS

    Three Procurement Technology Evolutions for 2023

    Sourcing/Procurement/SRM
  • DOCUMENTS BEARING THE INSIGNIA OF US CUSTOMS AND BORDER PROTECTION LIE ON A TABLE

    New CBP Regs Call for Greater Diligence by Brokers in Reporting Security Breaches

    Freight Forwarding/Customs Brokerage
  • The blank stare of a child's eye who is standing behind what appears to be a wooden frame

    The Alarming Continued Rise of Modern Slavery in Supply Chains: How Procurement Can Help Reverse the Trend

    Sourcing/Procurement/SRM
  • A GROUP OF WORKERS RANGED IN AN OFFICE, OF DIVERSE RACE, GENDER, AGE AND PHYSICAL ABILITY

    Podcast | The Supply Chain Workforce of the Future Is Already Here

    HR & Labor Management

Digital Edition

Scb nov 2022 sm

2022 Supply Chain Innovator of the Year

VIEW THE LATEST ISSUE

Case Studies

  • New Revenue for Cloud-Based TMS that Embeds Orderful’s Modern EDI Platform

  • Convenience Store Client Maximizes Profit and Improves Customer Service

  • A Digitally Native Footwear Brand Finds Rapid Fulfillment

  • Expanding Apparel Brand Scales Seamlessly with E-Commerce Technology

  • How a Global LSP Scaled its Security Program and Won More Business

Visit Our Sponsors

Orderful Yang Ming Alithya
Barcoding Blue Yonder BNSF Logistics
CoEnterprise Data Capture Deposco
E2open GAINSystems Generix
Geodis GEP GreyOrange
Here Honeywell Intelligrated IFM
Infor Inmar Keelvar
Kinaxis Korber Lean Solutions Group 2H
Liberty SBF Locus Robotics Logility
LogistiVIEW Lucas Systems MCA Connect
MPO Nvidia Old Dominion
OpenText ORTEC Overhaul
Parsyl PMMI QIMA
Redwood Logistics Ryder E-commerce by Whiplash Saddle Creek Logistics
Schneider Dedicated Setlog Holding AG Ship4WD
Shipwell Tecsys TGW Systems
Thomson Reuters Tive Trailer Bridge
Vecna Robotics Verity
Verusen
  • More From SCB
    • Featured Content
    • Video Library
    • Think Tank Blog
    • SupplyChainBrain Podcast
    • Whitepapers
    • On-Demand Webinars
    • Upcoming Webinars
  • Digital Offerings
    • Digital Issue
    • Subscribe
    • Manage Your Subscription
    • Newsletters
  • Resources
    • Events Calendar
    • SCB's Great Supply Chain Partners
    • Supplier Directory
    • Case Study Showcase
    • Supply Chain Innovation Awards
    • 100 Great Partners Form
  • SCB Corporate
    • Advertise on SCB.COM
    • About Us
    • Privacy Policy
    • Contact Us
    • Data Sharing Opt-Out

All content copyright ©2023 Keller International Publishing Corp All rights reserved. No reproduction, transmission or display is permitted without the written permissions of Keller International Publishing Corp

Design, CMS, Hosting & Web Development :: ePublishing