A key security issue organisations are increasingly facing is not only ensuring their own network is secure, but also the networks of suppliers and third-parties that plug into it. Cybercriminals are invariably after one thing – data. The richest and most lucrative stores of data are found in the largest organisations.
Naturally, due to the complexities of running a multinational organisation, these businesses have the broadest and complex supply chains. From third-party suppliers to white label clients, each connection with another business is a potential point of weakness, and it's something cybercriminals are increasingly willing to exploit. The Best Buy, Sears, Kmart and Delta breaches of last year were engineered through vulnerabilities within a third-party chat app, for instance.
As supply chain attacks become increasingly commonplace, it’s almost inevitable that a breach will occur. It’s a tough pill to swallow, but businesses need to recognise this and therefore ensure they have the capability to rapidly detect and respond to threats in order to mitigate any damage.
Focusing on mean time to detect and mean time to respond as key security metrics is a good first step. That is, detecting a threat – whether it comes from a compromise on its own or a partner’s network – and subsequently shutting it down early in the cyberattack lifecycle. To achieve this, technologies like security information and event management or user and entity behaviour analytics, coupled with security orchestration, automation and response, should be key components of any firm’s security suite.
Ross Brewer, VP & MD EMEA at LogRhythm