VIDEO
Supply Chain Security Tips
Video Summary:
Many of the large-scale breaches - from Solar Winds to Kaseya to the new Log4j - leverage the supply chain to attack an even larger pool of organizations. Hackers can use their access to these suppliers or breached partners to worm their way into a large number of organizations. From there, they can hold you for ransom, take down operations, steal money or intellectual property, and sell or rent access to other cybercriminal gangs. Watch this 90-second video with quick supply chain security tips and a tips on why routinely applying security patches is part of reducing supply chain risks. For more information read our supply chain security blog: https://www.lmgsecurity.com/the-secrets-to-stronger-supply-chain-security/ or download this supply chain checklist: https://www.lmgsecurity.com/resources/supply-chain-security-checklist/ . You can also learn patch management tips in this blog: https://www.lmgsecurity.com/6-software-patch-management-policy-mistakes-and-how-to-fix-them/.
Many of the large-scale breaches - from Solar Winds to Kaseya to the new Log4j - leverage the supply chain to attack an even larger pool of organizations. Hackers can use their access to these suppliers or breached partners to worm their way into a large number of organizations. From there, they can hold you for ransom, take down operations, steal money or intellectual property, and sell or rent access to other cybercriminal gangs. Watch this 90-second video with quick supply chain security tips and a tips on why routinely applying security patches is part of reducing supply chain risks. For more information read our supply chain security blog: https://www.lmgsecurity.com/the-secrets-to-stronger-supply-chain-security/ or download this supply chain checklist: https://www.lmgsecurity.com/resources/supply-chain-security-checklist/ . You can also learn patch management tips in this blog: https://www.lmgsecurity.com/6-software-patch-management-policy-mistakes-and-how-to-fix-them/.