CSCMP's Supply Chain Quarterly
February 23, 2018

The Supply Chain of the Future – Tomorrow's Vision or Today's Reality?
Join Intel as we provide insight on how the Internet of Things will continue to transform key supply chain elements.
Supply Chain Executive Insight E-Newsletter
Each week the Supply Chain Executive Insight e-newsletter will include brief articles about developments that are often overlooked by other supply chain publications. We will present you with summaries of the latest research as well as new ideas on how to make your supply chain operations more effective. And we'll offer commentary that sheds light on what's happening in supply chains today.
Sign up now!

Most Read Articles

News from our sister publication
DC Velocity
Forward Thinking

Supply chain IT systems increasingly vulnerable to attack, analysts warn

Supply chain operations could lose millions of dollars due to IT breaches by 2016, according to a recent report.

By 2016, a single information technology (IT) incident in the supply chain could cost companies millions of dollars in data loss and remediation, according to an October 2012 report issued by two Gartner analysts, Neil MacDonald and Ray Valdes.

The report, "Living in a World Without Trust: When IT's Supply Chain Integrity and Online Infrastructure Get Pwned," says supply chains are increasingly vulnerable to hacker attacks because they require information to be exchanged between multiple partners. ("Pwned" is a slang term that originated in the hacker and online gaming cultures and means "owned" or badly beaten by an opponent.) While companies can shield their own data from hackers within their IT parameters, they often cannot protect the information that flows beyond their firewalls to and from their partners. Hackers are able to exploit weaknesses in those links to successfully penetrate security systems, according to the report.

The report recommends that companies be careful in their use of "open source" information systems and says that they should encrypt all sensitive data. In addition, because online purchasing portals can be especially vulnerable, companies must take steps to strengthen security around IT procurement processes.

The report is part of Gartner's "maverick research" program. Maverick research allows Gartner analysts to pursue new, unconventional research and share their insights, but the resulting reports are not intended to represent the opinion of the entire research firm.

Join the Discussion

After you comment, click Post. If you're not already logged in, you will be asked to log in or register.

Want more articles like this? Sign up for a free subscription to Supply Chain Executive Insight, a monthly e-newsletter that provides insights and commentary on supply chain trends and developments. Click here to subscribe.

We Want to Hear From You! We invite you to share your thoughts and opinions about this article by sending an e-mail to ?Subject=Letter to the Editor: Quarter 2012: Supply chain IT systems increasingly vulnerable to attack, analysts warn"> . We will publish selected readers' comments in future issues of CSCMP's Supply Chain Quarterly. Correspondence may be edited for clarity or for length.

Want more articles like this? Subscribe to CSCMP's Supply Chain Quarterly.