As the CEO of a leading supply chain management, e-procurement and financial productivity solutions company,
Lax procedures that fail to protect critical data leave businesses vulnerable to attacks that threaten customers and damage brands.
The threat also can compromise operational processes, including supply chains. Companies can avoid pitfalls by following these simple steps:
1. Analyze the supply chain for vulnerabilities. Conduct a comprehensive analysis in which each node and component of the supply chain is thoroughly examined. “Most industry experts are well aware of this important step, but companies just need to be certain that checking for cyber risk is part of the overall security assessment,” said Garcia.
2. Communicate. An extra step needs to be taken to ensure the IT department and supply chain team are part of that discussion. Surveys have shown that fragmented or one-off communication among entities is a problem. “The chief information officer, chief supply chain or procurement officer, and the chief risk officer all need to have tight communication,” Garcia said.
3. Tap the government as a resource. While one company’s supply chain might not be the government’s top priority, its focus on infrastructure from a cyber risk perspective certainly dovetails with corporate interests. “One resource to watch is a program between the Department of Homeland Security’s
4. Don’t say 'If.’ Say 'When.' In the sixth annual Global Technology, Media and Telecommunications Security study from the consulting firm Bersin by Deloitte, 68 percent of companies said they understood their cyber risks. Sixty-two percent said they had programs in place to address cyber security threats. However, 59 percent of those companies experienced a security incident in the past year. “Companies need total organizational visibility and a plan to enact in case of cyber threats in order to recover,” said Garcia. “Check to make sure your supply chain management software gives you that.”
Apptricity provides innovative software applications that help companies of all sizes run better and maximize their resources. Our applications deliver critical real-time intelligence to your mobile device, keeping you connected to the office, the warehouse, and the final destination.
Read the full story at http://www.prweb.com/releases/Apptricity/CyberSecurity/prweb11299141.htm
Most Popular Stories
- 2014 Will Be 'Breakthrough Year' for U.S., Obama Says
- Target Overwhelmed by Worried Customers
- Congress Ends Turbulent Year with Approving IRS Chief
- Prius Among Insurance Institute's 39 Top Safety Vehicles
- First Family Arrives for Hawaiian Island Holiday
- Renewable Energy Group to Acquire Syntroleum
- Ally Financial Settles Auto Loan Suit
- Covered California Lags on Hispanic Enrollment
- Climate Change Isn't an Equal Opportunity Destroyer
- Luis Suarez Re-ups With Liverpool F.C.