We use cookies to provide you with a better experience. By continuing to browse the site you are agreeing to our use of cookies in accordance with our Cookie Policy.
  • ::COVID-19 COVERAGE::
  • INDUSTRY PRESS ROOM
  • SUBMISSIONS
  • MEDIA FILE
  • Create Account
  • Sign In
  • Sign Out
  • My Account
Free Newsletters
  • MAGAZINE
    • Current Issue
    • Archives
    • Digital Edition
    • Subscribe
    • Newsletters
  • STRATEGY
  • GLOBAL
  • LOGISTICS
  • MANUFACTURING
  • PROCUREMENT
  • VIDEO
    • News & Exclusives
    • Viewer Contributed
    • Upload your video
  • BLOGS & MORE
    • White Papers
    • Webcasts
    • Events
    • Blogs
      • SCQ Forum
      • Reflections
    • Mobile Apps
  • MAGAZINE
    • Current Issue
    • Archives
    • Digital Edition
    • Subscribe
    • Newsletters
  • STRATEGY
  • GLOBAL
  • LOGISTICS
  • MANUFACTURING
  • PROCUREMENT
  • VIDEO
    • News & Exclusives
    • Viewer Contributed
    • Upload your video
  • BLOGS & MORE
    • White Papers
    • Webcasts
    • Events
    • Blogs
      • SCQ Forum
      • Reflections
    • Mobile Apps
Home » Supply chain IT systems increasingly vulnerable to attack, analysts warn
Forward Thinking

Supply chain IT systems increasingly vulnerable to attack, analysts warn

November 28, 2012
Supply Chain Quarterly Staff
No Comments

By 2016, a single information technology (IT) incident in the supply chain could cost companies millions of dollars in data loss and remediation, according to an October 2012 report issued by two Gartner analysts, Neil MacDonald and Ray Valdes.

The report, "Living in a World Without Trust: When IT's Supply Chain Integrity and Online Infrastructure Get Pwned," says supply chains are increasingly vulnerable to hacker attacks because they require information to be exchanged between multiple partners. ("Pwned" is a slang term that originated in the hacker and online gaming cultures and means "owned" or badly beaten by an opponent.) While companies can shield their own data from hackers within their IT parameters, they often cannot protect the information that flows beyond their firewalls to and from their partners. Hackers are able to exploit weaknesses in those links to successfully penetrate security systems, according to the report.

The report recommends that companies be careful in their use of "open source" information systems and says that they should encrypt all sensitive data. In addition, because online purchasing portals can be especially vulnerable, companies must take steps to strengthen security around IT procurement processes.

The report is part of Gartner's "maverick research" program. Maverick research allows Gartner analysts to pursue new, unconventional research and share their insights, but the resulting reports are not intended to represent the opinion of the entire research firm.

  • Related Articles

    Where is your supply chain most vulnerable to climate change?

    Running a large supply chain without advanced analytics is "increasingly unrealistic," says Gartner Research

    It's time to recognize your supply chain hero

Recent Articles by Supply Chain Quarterly Staff

IBM survey says digitalization trends will sweep trucking industry by 2030

Report tracks rise in cargo theft from storage facilities

Policy groups posit plan to support supply chains hit by Covid-19, winter storms

You must login or register in order to post a comment.

Report Abusive Comment

Most Popular Articles

  • The 3PL industry: time to reset

  • Resiliency starts with supplier mapping

  • Freight market growth expected to slow in 2021

  • Retailers designing stores to support inventory and logistics work, not just shopping

  • Seizing the helm

Featured Video

6cabd6ef 64df 4460 bb11 e90c2bdea0a5

Identifying Intralogistics Solutions to Fit Your Operation: LinkedIn Live Ep. 4

Viewer Contributed
As technology evolves, the advantages of using semi- and fully automated solutions to increase productivity and address labor shortages are clear. However, before an organization jumps fully into automation, optimization is a key step that must happen first. Intralogistics solutions, such as Raymond’s iWAREHOUSE and...

FEATURED WHITE PAPERS

  • Warehouse Management System Project Toolkit

  • Solving Talent Management Challenges Now and In the Future

  • Shaping Up Last Mile Delivery to Surpass Customer Expectations

  • Finding the Right Transportation Management Partner

View More

Subscribe to Supply Chain Quarterly

Get Your Subscription
  • SUBSCRIBE
  • E-NEWSLETTERS
  • ADVERTISING
  • CUSTOMER CARE
  • CONTACT
  • ABOUT
  • STAFF
  • PRIVACY POLICY

Copyright ©2021. All Rights ReservedDesign, CMS, Hosting & Web Development :: ePublishing