How Organizations Can Tackle Supply Chain Attacks

October 21, 2021

Attacks on supply chains are becoming more frequent, meaning that organizations need to consider what they can do to become more resilient to attacks.

Organizations and their information security teams can protect their networks from such attacks by ensuring that infrastructures that do not need to be directly connected to the Internet are not connected.

Lindy Cameron, CEO of the National Cyber Security Centre (NCSC), explained what companies need to do: “First, organizations need to establish a clear security direction with their suppliers, asking for and incentivizing good security through the supply chain. This is often relatively straightforward security practices, such as controlling how privileged access is managed. Second, organizations should take an approach where their design is resilient if a technology supplier is compromised. The SolarWinds incident is a good example. To be blunt, if your SolarWinds installation couldn’t talk directly to the internet – which it shouldn’t have been able to do – then the whole attack was irrelevant to your network.”

Cameron said organizations need to take an approach where their design is resilient, even if a technology provider is affected, citing the SolarWinds attack as a good example.

“To be blunt, if your SolarWinds installation couldn’t talk directly to the internet – which it shouldn’t have been able to do – then the whole attack was irrelevant to your network,” she said.

For more information, read the original story in ZDNet.

Top Stories

Related Articles

December 30, 2025 A fast-moving cyberattack has compromised more than 59,000 internet-facing Next.js servers in less than two days after more...

December 29, 2025 The U.S. National Institute of Standards and Technology (NIST) has warned that several of its Internet Time more...

December 29, 2025 A critical security flaw has been found in LangChain, one of the most widely used frameworks for more...

December 23, 2025 South Korea will require facial recognition scans to open new mobile phone accounts. The new rule is more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn