A hacker at work. Unlike typical cyberattacks, a supply chain infiltration requires more sophistication and patience than a script kiddie, phishing scam or brute force attack. However, while it is still possible that a supply chain cyberattack may commence as a typical phishing scam, the sophistication of a supply chain infiltration comes into play after the initial intrusion. (Credit: Husjur02/Shutterstock.com) Unlike typical cyberattacks, a supply chain infiltration requires more sophistication and patience than a script kiddie, phishing scam or brute force attack. However, while it is still possible that a supply chain cyberattack may commence as a typical phishing scam, the sophistication of a supply chain infiltration comes into play after the initial intrusion. (Credit: Husjur02/Shutterstock.com)

Countless organizations have devoted considerable amounts of resources and time building cybersecurity defenses in the last decade. However, efforts to build secure supply chain networks have only begun in recent years.

Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader

Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
  • Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.