- Supply chain attacks are increasingly frequent and more dangerous
- Many security teams are concerned about risks
- 70% of companies have suffered one or more attacks in the last year
A new Securityscorecard survey reveals that cybersecurity leaders face the serious risks of the supply chain and third parties. The survey describes that CISO and security professionals around the world are struggling to keep up with the rhythm of the expansion of threats.
The software supply chain has become a weak worry link for companies of all sizes, since smaller software suppliers are difficult to evaluate and, often, do not have cybersecurity capabilities that large organizations can pay, and cybercriminals choose smaller software companies as an intrusion point to obtain access to larger companies.
An amazing 88% of the respondents were “very worried” or “somewhat worried” about the risks of cybersecurity of the supply chain, and with a good reason too, since 70% say they have experienced one or more “cyber security incidents of third parties”, with 5% suffering 10 or more in the last year.
Persistent threats
Recent research suggests that the participation of third parties in threats has doubled from 15% to 30% in recent months, and a growing dependence on digital technologies also means a growing dependence on third -party software for all industries.
As such, organizations have the task of strict cybersecurity practices to stay safe. But, not everyone trusts their ability to do so, with only 26% of organizations that incorporate the security of the supply chain in their cyber security programs, most depends on ‘point evaluations over time, provided by cybernetic suppliers or insurance.
Cybersecurity can be overwhelming even for companies with powerful abilities, and almost 40% of respondents reported that data overload and problems to prioritize threats are their greatest challenge.
“Cyber attacks of the supply chain are no longer isolated incidents; they are a daily reality,” said Ryan Sherstobitoff, an intelligence officer of Securityscorecorec field threats
“However, the infractions persist because third -party risk management is maintained large Safety operations of the security centers, changing continuous monitoring and threats of the action of the real chain in the action of real times.