59% of companies are subject to cyberattack through their suppliers

    Devices and companies are getting more and more connected with each other. In addition to the measures that companies take to protect themselves, it is vital that the suppliers they include in their chains protect themselves. The report titled “Supply chain cyber security” published by BugBounter offers important topics for companies to better protect themselves against cyber attackers accessing their suppliers.

    BugBounter, which quickly and transparently addresses the need for companies to find security gaps through crowdsourcing, published an important report titled “Supply chain cyber security” regarding the cyber attacks that may be caused by the suppliers involved in the systems of the companies.

    According to the report, testing suppliers before starting any business relationship and during the relationship stands out as the first method companies can apply to avoid a cyber attack from suppliers. Subsequently, there is a continuous monitoring of data access as well as training of critical employees of suppliers.

    The published report includes different ways to avoid cyber attacks on a potential supply chain, recent events and important data related to this incident.

    The institutions and their supply partners are becoming more connected with each other day by day, and the associated cyber security threats affect companies deeply through the business partners in the supply chain. Although companies protect themselves with the most advanced security methods, it is very important for suppliers and business partners to be sure that they have a similar level of security. However, 59 percent of companies are attacked by a cyberattack through the suppliers involved in their systems, and 22 percent do not know if the supplier they work with has experienced a data breach in the past 12 months. Therefore, companies should take into consideration the potential of cyber attacks that they may encounter through the supply chain, in order to effectively protect sensitive data.