Page 23 - Logistics News - September - October 2021
P. 23

S UP P LY C H A IN




         phishing campaign should immediately be
         required to undergo training. Instil a strong
         password culture in which employees have
         varying and secure passwords. Ensure that
         they understand that if a password is breached
         in one place, it is possible and relatively simple
         for hackers to use it on other accounts associated
         with the same email.

            Th  ere are countless helpful (and free) cybersecurity
         resources available to supplement employee learning and
         keep employees updated on the latest industry trends,
         such as the virtual training modules provided by the U.S.   monitoring for security events should include physical
         Department of Homeland Security.               environments, networks, service providers and user activity.
                                                        Vulnerability scans are a great tool and should be performed
         •  Insurance. Make sure you have adequate insurance in   regularly on systems containing sensitive information.
          the event of an attack. Some insurance providers include
          ransomware protections. Inquire about what things are not   Response and recovery
          covered in a cyberattack.                     A correlation is evident between response time and the
                                                        cost of an attack. Industries that take the longest to detect,
         •  Physical security. Protect personnel, hardware, software,   react, respond and remediate incur the highest costs. A
          networks and data from physical trespassing and actions.   fast response can help mitigate the impact. Still, it cannot
          Consider solutions like surveillance cameras, security   eliminate the possibility, so there is always an emphasis on
          guards, security systems, barriers, locks, access key cards,   prevention.
          fi re alarms, sprinklers and other systems designed to
          protect employees and property.                  A disaster recovery plan is critical to restoring data access
                                                        and IT infrastructure after a disaster. Recovery depends on
            Beware of piggybacking. Holding the door open for   the scope of the damage.
         someone walking into the offi  ce with their hands full
         may seem polite, but it poses a security threat. Make sure   Chart out a response plan and a remediation road map
         everyone who enters company premises is authorised   for all potential incident scenarios in the form of a business
         personnel.                                     continuity plan. Include tactics that will keep the business
                                                        operational during a disaster. Determine vendor criticality
         •  Selective business relationships. Cyberattacks through   and a course of action if key vendors are attacked. Enlist
          supplier networks are becoming increasingly common.   backup suppliers and backups for your backups in case you
          According to the 2020 Cyber Resilient Organization Study   need to shift to another provider to accommodate customers.
          by the Ponemon Institute, 56 percent of organisations
          report that they have experienced a cybersecurity   As part of an eff ective disaster recovery plan, it is
          breach caused by a third-party supplier. In determining   recommended to simulate a cybersecurity breach at
          an acceptable level of risk, be selective when choosing   minimum once a year. Th  rough these drills, relevant
          contractors or partners to work with your company.  personnel understand their role and the procedures to be
                                                        followed. 
         •  Incident reporting. Instil a good culture and education
          for reporting incidents. IT professionals are more capable   Cybersecurity will be a prominent obstacle for businesses
          of reducing potential damage if they know about it sooner.  of all sizes as supply chains become more complex. Identify
                                                        weak links in the supply chain to ensure vulnerabilities are   L O GI S T I CS NEWS
         Detecti on                                     minimised and to prevent threat events. Building cyber
         It has been said that a home without smoke detectors is   resiliency will prepare your company for a worst-case scenario
         the same as a network without monitoring. Continuous   that would otherwise be more expensive and damaging. •


          www .l o g ist i csn e w s .c o .z a                            SEP T E MB E R/O CT O B E R 2021  21
   18   19   20   21   22   23   24   25   26   27   28