Ransomware and the supply chain

Issue 7 2021 Logistics (Industry)

Criminal syndicates have put the world on notice, with an increasing number of sophisticated attacks highlighting the need for a robust cybersecurity strategy. The almost daily headline-grabbing attacks are not unique to South Africa, they are happening around the world at an alarming pace. Their new hack of choice won’t surprise anyone who’s been paying attention – ransomware is taking the world by storm, almost no business or institution is safe and this should be a much-needed wake-up call for businesses and the government.

It’s no surprise that these attacks are gaining pace with a risk-reward ratio tipped incredibly in the hackers’ favour. Estimates show hackers received $412 million in ransom payments last year. While awareness is certainly improving, there is a worrying trend that represents a significant threat to South Africa, just like in other regions around the world.

Ransomware attacks are now targeting supply chains, creating nearly inevitable threats for governments, municipalities, hospitals and businesses across the globe. As we know, South Africa can ill-afford extended breakages or blockages in the supply chain, the recent logistics disruptions severely hurt certain regions in KwaZulu-Natal and Gauteng, which if extended much longer would have had serious consequences for more regions.

Veeam Africa team lead, systems engineer, Ian Engelbrecht, says in South Africa and other regions of the continent, security is ahead of function and location in the pecking order of considerations. He says: “Organisations have a pressing need to secure themselves as the long-term consequences of failing to do so are devastating. Here, managing and upgrading infrastructure is vitally important, as is building a careful strategy to manage legacy applications and the risks inherent in them.”

With a global uptick in ransomware attacks targeting supply chains, organisations must implement stronger, layered security strategies to protect against lurking vulnerabilities. Cybercriminals have become much less methodical when launching attacks against organisations, often casting their nets with no specific target in mind, just to see what they can find. As a result, many of the hits against the supply chain are ‘accidental’ – third-party collateral due to unsecured back doors uncovered by attackers. Whether the supply chain was the initial target of the attack, or became the attack vector as an opportunistic hit, the approach to ransomware protection is only as effective as all of its ingredients. That means effective supplier collaboration and transparency, robust data backup and improved security maintenance.

The supply chain’s ripple effects

Supply chains are incredibly complex webs of trading partners, commerce transactions, logistics and more. This complexity is compounded by the fact that there are tier-two and three suppliers within your own supply chain that you may not even know exist, but could still impact your business if they are the target of a ransomware attack. You may not be the target, but you can still be a victim as their breach extends to their trading partners.

In light of this, it’s absolutely fair game – and smart business practice – to ask your suppliers how they are improving security measures and protecting against ransomware attacks. Now is the time to ask about quality standards, security practices, abilities to understand data protection/the transparency into their dependencies and what you could be potentially exposed to based on their business activities. A thorough approach to supply chain management takes into consideration that you’re only as secure as your least secure trading partner or supplier. You can do everything perfectly in terms of your own security measures, but one supplier’s lapse in security can spoil the bunch. It’s within your rights as a business to ask this of your suppliers.

Don’t skimp on data backup

Any good business leader knows there are areas and departments where you can safely cut costs without significant risk and other places to double down when it means protecting your business. Data backup and recovery is one such area where no business should cut costs or corners, especially with the rise in ransomware. While a robust backup and recovery strategy won’t alone keep you safe from ransomware attacks, it will put businesses in a much better position when the inevitable does occur – leaving hackers left with less options when you’re able to recover critical data quickly on your own.

It’s not just about implementing the right data solutions though, but also about maintaining and consistently testing them. It’s critical to consistently test your backups in advance of an attack – because it won’t do you any good after the fact. One way to do this is to think like the hackers. There are many different ways to simulate attacks, including hiring professional, ethical hackers who can purposely look at and target your vulnerabilities to find out where you’re most at risk, but with no real-world danger of data theft or loss. If you can’t hire these simulation actors, it’s important to test your backup and recovery solutions frequently and thoroughly on your own as often as you can to find and resolve risks.

Review and enhance your security standards and best practices

It’s no secret the Covid-19 pandemic led to an increased state of urgency for enterprise security, overnight people were thrust into work-from-home scenarios, with little-to-no time for IT departments to prepare. And when you move fast there’s a lot of potential for mistakes. From a security perspective, the cloud is still new for many organisations, especially those that moved to the cloud hastily or in a rush out of necessity.

For all organisations, regardless of their IT department’s cloud sophistication, it’s a best practice to revisit all protocols that were adopted as part of the initial cloud migration to ensure they’re secure, hardened and cost-effective. Especially as security and hyperscaler cloud settings can change at a moment’s notice (options, etc.), there’s a need to continually monitor, evaluate and implement the latest security standards. It’s on IT to identify exposures and vulnerabilities and surface them up to management to secure C-suite support and budget.

Hackers continue to get more sophisticated, with new trends like ransomware-as-a-service (RaaS), a consumer-driven offering that multiplies the volume of attackers by lowering the technical skill required to launch a ransomware attack. Like a game of chess, as your opponent (hackers) evolve, so does your defence strategy need to evolve. To prepare, organisations need to follow the right recipe of supply chain transparency, data backup and security maintenance and testing. Failure to do so could result in your business getting its 15 minutes of fame as the next victim of ransomware.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Vital fire detection for ODE
Johnson Controls Global Products Editor's Choice Fire & Safety Logistics (Industry)
Johnson Controls’ solution meets stringent safety audits and makes it easier for ODE to obtain building and contents insurance.

Read more...
Inventory management for SMEs
Logistics (Industry)
Cquential has launched an inventory management system designed for smaller companies in multiple sectors, which can be purchased as a monthly service.

Read more...
Fire safety in warehousing
Technoswitch Fire Detection & Suppression Technews Publishing Logistics (Industry) Fire & Safety
Warehouses are generally large spaces with high ceilings, making them difficult to effectively protect from fire safety risks, especially when one wants to identify a fire in its initial stages and stop it before damages are incurred.

Read more...
Unarmed guards are no longer an option
Technews Publishing Logistics (Industry) Security Services & Risk Management
Criminals today are more violent than ever in carrying out their nefarious activities, and, in general, more organised and informed.

Read more...
Early warning is essential
Editor's Choice Fire & Safety Logistics (Industry)
The trend is for larger, taller and more flexible warehouse constructions with dense and complex racking systems and an increasing level of warehouse automation, which pose a number of challenges for fire safety.

Read more...
Elite Truck Hire harnesses the power of information
Transport (Industry) Access Control & Identity Management Products Logistics (Industry)
Elite Truck Hire launched a search for a specialist fleet management programme that led the company to FleetDomain, a member of the Argility Technology Group.

Read more...
Transport and logistics challenges in turbulent times
Editor's Choice Access Control & Identity Management Integrated Solutions Transport (Industry) Logistics (Industry)
Moving people and property safely and securely during these challenging times is a complex responsibility and technology is helping transport and logistics companies ensure operational continuity, facilitate uninterrupted movement and meet compliance requirements.

Read more...
Confidence with cloud-based warehouse management
Logistics (Industry) Integrated Solutions IT infrastructure
When companies rely on a dated warehouse management system (WMS) to run distribution centres, it’s not uncommon for the IT staff familiar with the system to move on.

Read more...
Optimising the supply chain
Transport (Industry) Integrated Solutions Logistics (Industry)
VSC Solutions has joined forces with Frontline Market Research to augment its strategic supply chain optimisation services with route-to-market and territory expansion capabilities.

Read more...
Technology to optimise logistics
ZKTeco Transport (Industry) Asset Management, EAS, RFID Products Logistics (Industry)
Solutions are required across the board to reduce the overall cost of logistics for increased competitiveness, allowing companies to compete on value addition rather than on price alone.

Read more...