practices implemented are in line with
industry standards to reduce the chance
of unintentionally opening the enterprise
to new risks.
Security awareness training for
the workforce is the final vital step,
ensuring that staff are able to identify
and avoid cyberthreats like phishing,
malware and scams. Utilising security
tools to scan emails, manage
communications and quarantine
any malicious threats that make it
through the enterprise’s security
perimeter should also be in place.
Many organisations are eliminating the
risks posed by the vulnerabilities of the
www.intelligentciso.com
|
Issue 14
traditional browser by disconnecting it
from local IT and moving it to the cloud
to create an additional layer of security.
Finally, when it comes to the transfer of
personal or sensitive data between a
supplier and vendor, compliance tools can
help find data leaks before hackers do.
Understand supply chain
dependencies
Modelling and analysing the supply
chain – including identifying the
operational impact of a critical supplier’s
facility being out of commission – will
help uncover any hidden or overlooked
Taking a holistic
approach to data
security is a must
– and there are a
number of steps
organisations can
take to mitigate their
supply chain risk.
75