Dealing with Breaches in the Supply Chain

May 24, 2017 11:20am

  • Is the supply chain or third party involvement the favoured route of cyberattack?
  • Are smaller less protected suppliers are used as a backdoor into the systems of well protected organisations?
  • Using proxy isolation to prevent access
  • Performing regular audits on supplier’s activities
  • Continuous monitoring of privileged user accounts
  • Was Target a target?