Security Market Segment LS
Tuesday, 08 December 2015 12:09

BAE: Suppliers could be your weakest cyber security link


Cyber attackers are increasingly using their target organisation’s supply chain as a route to attack them and access their data or internal systems.

According to BAE Systems Applied Intelligence, smaller organisations throughout the supply chain often don’t have the same stringent security measures in place compared with larger organisations.

BAE says these gaps in a small supplier’s cyber defences can create weaknesses for their larger clients. For example, criminals may use a supplier’s website to host malware. This is difficult to combat, because businesses often have to place a certain level of trust in that website or the emails coming from that supplier’s website.

Dr Rajiv Shah, Regional GM at BAE Systems Applied Intelligence said, “Organisations are increasingly interconnected with their suppliers and, while this provides a variety of business benefits, it also comes with security risks. The security of your networks is often only as good as the weakest link in the system.

“You might think you understand your systems and the security measures you have in place, but how well do you know the security of your suppliers’ systems? Cyber criminals are very aware of these connections and are using them to access networks that are otherwise well-protected.”

So, what are three key ways that BAE recommends so organisations can protect themselves from the potential threats posed by a suppliers’ access to your networks, infrastructure, people or premises?

The answers are below, please read on!

1. Written security agreements with suppliers

The first step is to ensure clear understanding and expectations of how your suppliers protect their business and, by extension, yours. Where possible, organisations should make sure their suppliers adhere to certain processes and protocols that minimise the likelihood of such attack vulnerabilities, even if they don’t have the resources for high-level cyber defence technology. A written agreement regarding these processes and protocols sets the right expectations at the start of an engagement and can be an easy first step in reducing risks when connecting with suppliers.

2. Train your people – and theirs

One of the top ways cyber criminals gain unauthorised access to internal systems is through simple email-based methods, such as spear phishing. Attackers are now starting to use legitimate email servers, which they have compromised, to launch these campaigns, making suspect emails harder to identify. Organisations need to educate their staff and their suppliers about how to spot suspect emails and other communications before they become a problem.

3. Additional technology barriers between internal and external systems

Attackers are known to use direct network connections from smaller vendors to get into larger target organisations. This trend is expected to continue over the coming years, largely because the bigger, highly-targeted organisations have a budget for cyber security that smaller players generally don’t have access to. To protect themselves, larger organisations need to put several layers of protection between themselves and their suppliers to make sure communications from suppliers’ systems aren’t carrying malicious threats.

BAE concludes by stating: ‘Taking the right steps means you can still get the benefits of working closely with your suppliers – without exposing your business to unnecessary risk.’

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinatrs and campaigns and assassistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.



iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.


Alex Zaharov-Reutt

Alex Zaharov-Reutt is iTWire's Technology Editor is one of Australia’s best-known technology journalists and consumer tech experts, Alex has appeared in his capacity as technology expert on all of Australia’s free-to-air and pay TV networks on all the major news and current affairs programs, on commercial and public radio, and technology, lifestyle and reality TV shows. Visit Alex at Twitter here.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News