•   Exclusive

Guarding Against Cyber Threats

In a world awash in cyber threats, partners and suppliers can be the vulnerable points that cyber criminals exploit to gain access to systems. Those challenges will get worse before they get better as supply networks become ever more complex.

Subscriber: Log Out

Sorry, but your login has failed. Please recheck your login information and resubmit. If your subscription has expired, renew here.

This is an excerpt of the original article. It was written for the January-February 2017 edition of Supply Chain Management Review. The full article is available to current subscribers.

January-February 2017

Transformation is a topic that comes up in almost every conversation I have with supply chain managers these days. Executives from companies as diverse as J&J Vision Care, the division of Johnson & Johnson that manufactures contact lenses, and Thrive Markets, a startup selling health and wellness products to its members, have talked about how they have had to remake their supply chains to meet new customer demands. Transformation is also the theme of this issue of SCMR.
Browse this issue archive.
Already a subscriber? Access full edition now.

Need Help?
Contact customer service
847-559-7581   More options
Not a subscriber? Start your magazine subscription.

Not too long ago, Goodwill Industries found that its customers’ payments data had been breached by cyber criminals. Data from 868,000 payment card accounts was stolen. The entry point for the attack? Hackers had used malware to penetrate a third-party vendor’s systems.

A year earlier, Target made news when it suffered a huge and highly publicized breach in which data from 110 million customers and 40 million payment cards was stolen. The national retailer’s systems were initially breached via a connection with one of its vendors, an HVAC provider.

Goodwill and Target are by no means alone. Cyber breaches are proliferating year over year, affecting the confidentiality, integrity and availability of data; recent research by IBM indicates that just between 2014 and 2015, the number of such security incidents increased by 64%. These statistics probably reveal just the tip of the iceberg; they refer only to the security incidents that are detected and declared.

This complete article is available to subscribers only. Log in now for full access or start your PLUS+ subscription for instant access.

SC
MR

Sorry, but your login has failed. Please recheck your login information and resubmit. If your subscription has expired, renew here.

From the January-February 2017 edition of Supply Chain Management Review.

January-February 2017

Transformation is a topic that comes up in almost every conversation I have with supply chain managers these days. Executives from companies as diverse as J&J Vision Care, the division of Johnson & Johnson…
Browse this issue archive.
Access your online digital edition.
Download a PDF file of the January-February 2017 issue.

Not too long ago, Goodwill Industries found that its customers' payments data had been breached by cyber criminals. Data from 868,000 payment card accounts was stolen. The entry point for the attack? Hackers had used malware to penetrate a third-party vendor's systems.

A year earlier, Target made news when it suffered a huge and highly publicized breach in which data from 110 million customers and 40 million payment cards was stolen. The national retailer's systems were initially breached via a connection with one of its vendors, an HVAC provider.

Goodwill and Target are by no means alone. Cyber breaches are proliferating year over year, affecting the confidentiality, integrity and availability of data; recent research by IBM indicates that just between 2014 and 2015, the number of such security incidents increased by 64%. These statistics probably reveal just the tip of the iceberg; they refer only to the security incidents that are detected and declared.

SC
MR

Latest Podcast
Talking Supply Chain: Doomsday never arrives for Baltimore bridge collapse impacts
The collapse of Baltimore’s Francis Scott Key bridge brought doomsday headlines for the supply chain. But the reality has been something less…
Listen in

Subscribe

Supply Chain Management Review delivers the best industry content.
Subscribe today and get full access to all of Supply Chain Management Review’s exclusive content, email newsletters, premium resources and in-depth, comprehensive feature articles written by the industry's top experts on the subjects that matter most to supply chain professionals.
×

Search

Search

Sourcing & Procurement

Inventory Management Risk Management Global Trade Ports & Shipping

Business Management

Supply Chain TMS WMS 3PL Government & Regulation Sustainability Finance

Software & Technology

Artificial Intelligence Automation Cloud IoT Robotics Software

The Academy

Executive Education Associations Institutions Universities & Colleges

Resources

Podcasts Webcasts Companies Visionaries White Papers Special Reports Premiums Magazine Archive

Subscribe

SCMR Magazine Newsletters Magazine Archives Customer Service