MMH    Topics     Blogs

Protecting Data in a Digital Supply Chain

In today’s interconnected world, data protection and cybersecurity are essential to manage supply chain risk. Fifth in a five-part series exploring the critical role of data in a digital supply chain transformation


Editor’s note: This is Part 5 of a five-part series exploring the critical role of data in a digital supply chain transformation.

You can read Part 1 by clicking on this link
You can read Part 2 by clicking on this link.
You can read Part 3 by clicking on this link.
You can read Part 4 by clicking on this link.
You can read Part 5 by clicking on this link.

In this five-part series we’ve shared ideas on the central role of data in the digital supply chain. However, along with the tremendous opportunities it provides, the digital supply chain creates new risks. Data protection and cybersecurity must now be essential parts of any supply chain risk management program.

As companies make the digital transformation – internally and throughout their supply chain - more critical data is being shared in far-reaching global supply chains. Competitive advantage is increasingly coming from confidential business data - trade secrets, process know-how, and proprietary algorithms. There is more collaboration and data integration between companies which makes data protection more complicated.

In addition, the explosion in consumer data and its utilization has driven a wave of regulations concerning how personally identifiable information (PII) is stored, processed, transferred, and used. From Europe’s General Data Protection Regulation (GDPR) to the California Consumer Privacy Act (CCPA) and China’s new Personal Information Protection Law, regulations are sweeping the globe. Companies have responded by establishing data privacy programs for how they handle PII internally and with their supply chain partners.

Today, companies need to be concerned with protecting confidential business information and trade secrets and in meeting data privacy regulations. Cybersecurity attacks can be devastating to business continuity, as well as to data loss.

Every effective program needs to start with assessing the risks and prioritizing what data and systems are most critical to protect. In the case of data protection and cybersecurity, it is important to assess the risk through two lenses: data loss or compromise and business continuity. Evaluate the negative impact of trade secrets going public, or critical inventory and shipping data being altered. But also evaluate the negative impact of being unable to send or receive payments or purchase orders.

It’s hard enough to manage the data loss and business continuity risks internally. Now add thousands of suppliers, distributors, and customers to the data flow in a digital supply chain. You should never think about cybersecurity without considering third-party risk. And conversely, the companies in your supply chain, even small ones, should never think they’re safe because you “don’t have anything hackers would want.”

In today’s inter-connected digital world every organization of any size is a potential target. Hackers will try to go through you to get to another company and they will try to go through your customers or suppliers to get to you. The whole situation is made much more complicated because of the new hybrid (remote/office) workplace. Your employees may be rotating from home to office, using different devices and connections. Although you may feel you have the situation under control, what about your supply chain partners?

In the past 18 months, partially in direct response to the pandemic, hackers have systematically focused on supply chain cyber-attacks, often in the form of ransomware. There are several reasons to target companies in the supply chain of a major multi-national company. Many of the suppliers are small and medium-size companies with much less sophisticated cybersecurity controls. The supplier can be a gateway to the main target through their connected enterprise resource planning systems. Plus crippling the supplier can directly impact the business continuity of the multinational company.

The SolarWinds hack is a reminder that cybersecurity is a supply chain issue. SolarWinds was a gateway, not the ultimate target. But it’s not a new supply chain issue. The Target breach in 2014 was a widely publicized example of hackers using one company (an HVAC vendor) to get at their real target (Target).

These are both perfect examples of why supply chain cybersecurity is so critical. Hackers are systematically using supply chain companies as a gateway to access high-value targets.

Cross-functional coordination between supply chain, IT, cybersecurity, legal and compliance is critical to building a practical, sustainable program to protect data and reduce cyber risk. Two important points to keep in mind:

• One, you can’t build impenetrable walls around your company, because data needs to flow to the other companies in your supply chain.
• Two, human behavior is critical to data protection and cybersecurity.

For large companies, there are some basic steps you should immediately take with your supply chain partners to help them protect themselves and ultimately protect you. Most important, every company in your supply chain should have a designated, trained Cyber Leader. A person that is responsible for building a culture of cybersecurity by focusing on human behavior. They don’t need to be technology experts. They need to be able to communicate how important it is for the everyone to develop good cyber habits. They need to make sure that the company puts some simple policies in place around four core issues:

• Passphrases: use 15-character passphrases. It has been reported that some employees at SolarWinds were using “solarwinds123” as their password. Don’t make it easy for hackers to crack your passwords. Any 8-character password can be hacked in 3 minutes, but a 13-character password takes 5.2 million years using the same computing power.
• Multi-factor authentication: Use it any time it is offered. If it is not offered, consider switching to a software or service that does offer it.
• Phishing: Conduct re-fresher training for employees on how to spot a phishing email or text. The email may even look like it is coming from another person in their company or from your company. Reinforce the message to never open an attachment or link if at all suspicious. Tell employees to contact the sender through alternative channels to verify it is real.
• Devices: Encourage third parties to review what devices their employees are using to connect to their network or to your network. If they are using personal devices, make sure they follow the rules about passphrases and multi-factor authentication. Avoid the use of USBs and removable media to transfer documents.

It is urgent for all companies to extend their culture of cybersecurity to their supply chain partners. Push the companies in your supply chain to develop good cyber habits. It is critical to your company and every company you touch.

About the author: Craig Moss is Director of Data and Change Management for The Center for Global Enterprise’s Digital Supply Chain Institute (DSCI). To learn more, visit DSCI.


Article Topics

Blogs
Big Data
Center for Global Enterprise
Craig Moss
Digital Supply Chain
Digital Supply Chain Institute
Digital Transformation
   All topics

Digital Transformation News & Resources

Talking Materials Handling:  A Guide To Supply Chain Analytics
The reBound Podcast: Innovation in the 3PL supply chain
The Rebound: 3D Transformation at GE Appliances
Powering the Industrial Process With Digital Data
Colgate-Palmolive deploys decision intelligence as part of its digital transformation
What’s keeping the supply chain C-Suite up at night?
Kimberly-Clark turns to EARL to manage order bunching
More Digital Transformation

Latest in Materials Handling

Beckhoff USA opens new office in Austin, Texas
Manhattan Associates selects TeamViewer as partner for warehouse vision picking
ASME Foundation wins grant for technical workforce development
The (Not So) Secret Weapons: How Key Cabinets and Asset Management Lockers Are Changing Supply Chain Operations
MODEX C-Suite Interview with Harold Vanasse: The perfect blend of automation and sustainability
Consultant and industry leader John M. Hill passes on at age 86
Registration open for Pack Expo International 2024
More Materials Handling

Subscribe to Materials Handling Magazine

Subscribe today!
Not a subscriber? Sign up today!
Subscribe today. It's FREE.
Find out what the world's most innovative companies are doing to improve productivity in their plants and distribution centers.
Start your FREE subscription today.

Latest Resources

Materials Handling Robotics: The new world of heterogeneous robotic integration
In this Special Digital Edition, the editorial staff of Modern curates the best robotics coverage over the past year to help track the evolution of this piping hot market.
Case study: Optimizing warehouse space, performance and sustainability
Optimize Parcel Packing to Reduce Costs
More resources

Latest Resources

2023 Automation Study: Usage & Implementation of Warehouse/DC Automation Solutions
2023 Automation Study: Usage & Implementation of Warehouse/DC Automation Solutions
This research was conducted by Peerless Research Group on behalf of Modern Materials Handling to assess usage and purchase intentions forautomation systems...
How Your Storage Practices Can Affect Your Pest Control Program
How Your Storage Practices Can Affect Your Pest Control Program
Discover how your storage practices could be affecting your pest control program and how to prevent pest infestations in your business. Join...

Warehousing Outlook 2023
Warehousing Outlook 2023
2023 is here, and so are new warehousing trends.
Extend the Life of Brownfield Warehouses
Extend the Life of Brownfield Warehouses
Today’s robotic and data-driven automation systems can minimize disruptions and improve the life and productivity of warehouse operations.
Power Supply in Overhead Cranes: Energy Chains vs. Festoons
Power Supply in Overhead Cranes: Energy Chains vs. Festoons
Download this white paper to learn more about how both systems compare.