logo_lightAlogo_lightlogo_light
  • About
  • Products
  • Pricing
  • Knowledge Base
  • Login
  • Products
  • Solutions
  • Search
supply chain factory

Supply chain vulnerabilities and dependencies are evident from ransomware attacks

[et_pb_section fb_built=”1″ _builder_version=”4.4.6″ custom_padding=”0px|||||” da_disable_devices=”off|off|off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.4.6″ custom_padding=”||8px|||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.8.2″]

On May 30, JBS, the world’s largest producer of beef and pork was hit with a major ransomware attack. The outage impacted the company’s operations in the USA, Australia and Canada. The growing trend in ransomware attacks highlights the vulnerability of organizations in many industries.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.4.6″ custom_padding=”5px||8px|||”][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.8.2″]

As attacks grow in size, the supply chain effects become evident

The JBS outage comes only a few weeks after the Colonial Pipeline ransomware attack that impacted half of the East Coast’s gasoline distribution, and a few months after major healthcare facilities were hit. There is an indication that the size of these attacks is now beginning to affect supply chains.

The direct cost from lost operations, and the payment of ransoms aren’t the only concerns. There is clearly a domino effect that can occur in supply chains. Each organization usually depends on key players in an industry.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_image src=”https://clickarmor.ca/wp-content/uploads/2021/06/factory-unsplash-ant-rozetsky-qB1_5wCp82I-unsplash.jpg” alt=”supply chain factory” title_text=”factory-unsplash-ant-rozetsky-qB1_5wCp82I-unsplash” show_in_lightbox=”on” _builder_version=”4.8.2″ width=”100%”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″ custom_padding=”8px|||||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.8.2″]

Even in small business environments, there is almost always a key supplier that impacts the operation of many others up and down the chain. And when one of these entities gets hit with a cyber-attack, it can have major, unexpected consequences. In particular, the largest businesses will need to start enforcing cybersecurity standards on their supply chains. This is an attempt to reduce the risks of cyber-attacks knocking out key links in the chain, and spreading from one supplier to another.

Standards are good, but the key is in developing and monitoring cyber security proficiency of employees

To strengthen security in these supply chains, we are already seeing a new trend in standards such as SOC 2 and the Cyber Maturity Model Certification (CMMC) among even small service businesses and manufacturers. The intent is to make the supply chain more resilient through employee awareness of security requirements. But while standards compliance can show visible action on the surface, it doesn’t mean that there is significantly less risk from employees being vulnerable or making poor risk decisions.

The businesses working to become compliant with these standards may still be vulnerable after a certification is achieved. This can be especially true if their staff don’t take the requirements of the standard seriously. In fact, they may still not even really know how to implement the security procedures that are intended to protect those business systems.

The best way to ensure that these standards are followed is through a full program of proficiency training and exercises that engage all employees to defend the business’s systems and data. Simulations and gamified challenges effectively engage employees and improve their knowledge retention.

Did you know that Click Armor’s gamified simulation solution has been shown to improve employee proficiency in handling phishing threats by up to 50%?

We can provide gamified challenges and simulations in many risk areas. We can also do gamified assessments for teams, without the need to register employees. You can try a simple gamified phishing assessment at www.canibephished.com to test your own phishing awareness skills. 

Contact us to learn more.

 

Photo by Ant Rozetsky on Unsplash

 

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_post_nav prev_text=”Previous Post” next_text=”Next Post” _builder_version=”4.4.6″ title_text_color=”#ffffff” background_color=”rgba(14,79,136,0.68)” custom_padding=”5px|10px|5px|10px|true|true” border_radii=”on|4px|4px|4px|4px” border_width_all=”1px”][/et_pb_post_nav][/et_pb_column][/et_pb_row][/et_pb_section]

Share
0
[vc_empty_space height="40px"] [vc_row][vc_column width="1/2"][vc_column_text css=""]

Subscribe to our newsletter

Stay up-to-date with the latest news, promotions, and offers from Click Armor.
Follow us on Linkedin

You can unsubscribe at any time

[/vc_column_text][/vc_column][vc_column width="1/2"][vc_column_text css=""][vc_empty_space height="10px"]Subscribe [/vc_column_text][/vc_column][/vc_row]

Click Armor helps business managers battling cyber and compliance risks by using gamified simulations and challenges to engage end-users to avoid breaches and build a strong security culture.

[vc_empty_space height=”0px”]

[elfsight_social_icons id=”4″]

Recent Articles

  • Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve June 16, 2025
  • Addressing AI opportunities and risks in your cyber security program March 13, 2025

Resources


[vc_row][vc_column width=”1/2″][vc_column_text css=””]
News & Insights
Partner and MSP Program
Gamified Learning
About Click Armor
Our Team
Careers
Pricing
[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css=””]

Take Assessment
Can I be phished?
Community Forum
Contact


Student Login

[/vc_column_text][/vc_column][/vc_row]

© Copyright All Rights Reserved • Click Armor Corp. | Privacy policy • Terms of use