Although most people are aware of the major Solar Winds attack that compromised many organizations through its supply chain, lower-scale, less sophisticated supply chains are also increasingly being exploited, specifically in the developer or mobile environments. Indeed, many entities are being compromised not because of poor enterprise security, but because of unsecured connections in their supply chains. To help reduce exploitable weaknesses from your supply chain, members are reminded to reference WaterISAC’s 15 Cybersecurity Fundamentals for Water and Wastewater Utilities, #13 Secure the Supply Chain. Most notably, the importance of performing risk assessments of all suppliers and vendors in your supply chain, regardless of size, cannot be overstated. Read more at ZDNet.
You are here
Related Resources
Jun 28, 2024 in Cybersecurity, in OT-ICS Security, in Security Preparedness
Jun 27, 2024 in Cybersecurity, in Security Preparedness
Jun 27, 2024 in Cybersecurity, in OT-ICS Security, in Security Preparedness