- Advertisement -
- Supply Chain attacks are becoming more frequent and more dangerous
- Many security teams are concerned about the risks
- 70% of companies have suffered one or more attacks in the past year
A new survey corecard study shows that CyberSecurity leaders are confronted with a serious supply chain and risks of third parties. The survey outlines that cisos and security professionals around the world have difficulty keeping up with the pace of growing threats.
The Software -Supply Chain has become a worrying weak link for companies of all sizesBecause smaller software providers are difficult to assess and often do not have the cyber security options that can afford large organizations – with cyber criminals that smaller software companies choose as an infringement of access to larger companies.
A stunning 88% of the respondents were either ‘very worried’ or ‘somewhat worried’ about supply chain cyber security risks, and with good reason also, because 70% say they have experienced one or more material external cyber security incidents, with 5% 10 or more in the past year.
Persistent threats
Recent research suggests Third -party involvement in threats have doubled From 15% to 30% in recent months, and a growing dependence on digital technologies also means a growing dependence on third -party software for all industries.
As such, organizations are charged with strict cyber security practices to keep themselves safe. But not everyone has faith in their ability to do this, with only 26% of the organizations that include Supply Chain security in their cyber security programs most depends on ‘point-in-time, suppliers supplied by suppliers or cyber insurance.’
Cyber security can be overwhelming, even for companies with powerful possibilities, and almost 40% of the respondents reported that data overload and problems with prioritizing threats are their biggest challenge.
“Supply chain cyber attacks are no longer isolated incidents; they are a daily reality,” said Ryan Sherstobitoff, Field Chief Threat Intelligence Officer at SecurityScorecard
“But infringements continue to exist because the risk management of third parties remains largely passive, aimed at reviews and compliance checklists instead of action. This outdated approach does not succeed in the insights that it collects cannot be operationalized. What is needed is a shift to active defense: supply chain incident of the Deals of Dealings and the Gapa -Dreesses Dealings Dealings and the Gapacilities Gapacilities Security activities to stop the dynamic states.
Maybe you like it too
- Advertisement -