Taking Steps to Proactively Address Supply Chain Security Risks | Press Release

Taking Steps to Proactively Address Supply Chain Security Risks

Posted on June 29, 2022 | Cybersecurity , Data Security

In The Logistics Point, Chris Spargen looks at how secure managed file transfer can help organizations combat data loss security risks in the supply chain. 

Excerpt:

"For cybercriminals, supply chains represent a highly tempting target. These highly connected systems often involve the control of millions of pounds worth of payments and shipped goods. All it takes is just a single breach and threat actors can potentially open up access to core systems and databases in one organization. An attack can then be cascaded to other partners in the ecosystem."

Read the full article here. 

 

Recent News
August 16, 2022

Following the release of Core Security’s Ransomware Simulator, Mark Bell, Managing Director of Infrastructure Protection at HelpSystems, shares vulnerability management best practices and more in an interview with e-ChannelNews. 

August 15, 2022

Response-based attacks targeting corporate inboxes have climbed to their highest volume since 2020, representing 41 percent of all email-based scams targeting employees, during Q2 of this year. This is according to the latest Quarterly Threat Trends & Intelligence Report from Agari and PhishLabs, part of the HelpSystems cybersecurity portfolio.

August 1, 2022

In this video, Stuart Sumner, Editorial Director of Computing and Donnie MacColl, Senior Director of Technical Services at HelpSystems, explore the trends surrounding the current state of automation and discuss how to create a successful implementation strategy for fast ROI.

July 29, 2022

Infosecurity Magazine’s Editorial Director, Eleanor Dallaway, interviews Donnie MacColl, Senior Director of EMEA Technical Services and DPO at HelpSystems, live from Infosec22. 

July 29, 2022

In his latest Forbes Advisor article, John Wilson, Senior Fellow, Threat Research at HelpSystems, looks at how fraudsters are targeting multifactor authentication and provides 3 ways to protect yourself.