Minimizing the Risk of Supply Chain Attacks

Best Practice Guidelines

Published February 2022

x

In December 2020, news of a cyberattack on IT monitoring company SolarWinds pushed supply chain cybersecurity attacks into the spotlight, but they are far from a new phenomenon. In fact, worryingly, nearly one in 10 ransomware victims (9%) stated that the attack found its way in via a trusted third-party supplier, according to Sophos’ 2020 survey of 5,000 IT managers across 26 countries.

But what is a supply chain attack exactly, and how do they work? More importantly: what can you do to protect your organization from the impact of a supply chain attack? These questions and more are answered in this paper.