<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Supply Chain Risk Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/supply-chain-risk/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/supply-chain-risk/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 08 Jul 2021 16:25:03 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Supply Chain Risk Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/supply-chain-risk/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 086 Supply Chain Hacks</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-086-supply-chain-hacks/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 09 Jul 2021 01:15:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Due Diligence]]></category>
		<category><![CDATA[Independent Assessment]]></category>
		<category><![CDATA[Kaseya]]></category>
		<category><![CDATA[Kaseya Hack]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[REvil]]></category>
		<category><![CDATA[REvil Ransomware]]></category>
		<category><![CDATA[Sodinokibi]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[SolarWinds Hack]]></category>
		<category><![CDATA[Supply Chain]]></category>
		<category><![CDATA[Supply Chain Hacks]]></category>
		<category><![CDATA[Supply Chain Risk]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2564</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 86. This week were going to talk about Supply Chain Hacks. This sounds familiar Back in #WeekendWisdom number 41, I talked about supply chain risks. Since then there have been a couple of massive global supply chain hacks that have occurred. What are these supply chain hacks you speak of? The&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-086-supply-chain-hacks/">#WeekendWisdom 086 Supply Chain Hacks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 86. This week were going to talk about Supply Chain Hacks.<span id="more-2564"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2564-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4</a></video></div>
<h3>This sounds familiar</h3>
<p>Back in <a href="https://www.l2cybersecurity.com/weekendwisdom-041-supply-chain-risk/" target="_blank" rel="noopener">#WeekendWisdom number 41</a>, I talked about supply chain risks. Since then there have been a couple of massive global supply chain hacks that have occurred.</p>
<h3>What are these supply chain hacks you speak of?</h3>
<p>The first one was late last year. The SolarWinds hack was revealed. SolarWinds makes network monitoring software that are used by large corporates and government agencies.</p>
<p>But for my audience, which will be the more smaller business owner, something happened last week. A company called Kaseya, they provide software for IT managed service providers who obviously look after the IT for their customers which are usually small businesses. This software enables those managed service providers to be able to remotely manage and control their client&#8217;s devices.</p>
<h3>What happened with the Kaseya hack?</h3>
<p>Well Kaseya were hacked and had their client&#8217;s devices were ransomed by the REvil ransomware gang. Now REvil claim that they have infected a million devices around the globe and they&#8217;re looking for $70 million to free up these devices. The whole story is still playing out, so we don&#8217;t know the full details of it yet.</p>
<h3>What can you do about this type of risk?</h3>
<p>But how would you, as a small business owner, be able to try and protect yourself from such a supply chain hack?</p>
<p>Well you really do need to make sure that any third party that is going to put some kind of service or device or software into your network, into your environment, to carry out a full, thorough due diligence on that supplier and their application.</p>
<p>If you don&#8217;t have the capability in-house, there&#8217;s plenty of people out there in the market and in the business that will be able to provide you with an independent assessment.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-086-supply-chain-hacks/">#WeekendWisdom 086 Supply Chain Hacks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4" length="37504000" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 041 Supply Chain Risk</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-041-supply-chain-risk/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 23:05:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Supply Chain]]></category>
		<category><![CDATA[Supply Chain Risk]]></category>
		<category><![CDATA[Target Hack]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2257</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 41. This week we&#8217;re going to talk about Supply Chain Risk. I hear from a number of small business owners who say &#8220;I&#8217;m too small. There would be nobody interested in hacking me.&#8221; How does a Supply Chain Risk occur? Criminals may not be interested in hacking that business. But if&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-041-supply-chain-risk/">#WeekendWisdom 041 Supply Chain Risk</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 41. This week we&#8217;re going to talk about Supply Chain Risk.<span id="more-2257"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2257-2" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-041-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-041-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-041-lo.mp4</a></video></div>
<p>I hear from a number of small business owners who say &#8220;I&#8217;m too small. There would be nobody interested in hacking me.&#8221;</p>
<h3>How does a Supply Chain Risk occur?</h3>
<p>Criminals may not be interested in hacking that business. But if they find out that that business has a big customer that they are more interested in, things might change. What they might try and do is compromise the security of that small business so they be able to get in through them, to the big customer. So that&#8217;s where they&#8217;re trying to get into the supply chain for their actual victim.</p>
<h3>Can you give me a for example?</h3>
<p>A great example of this type of supply chain risk occurred back in late 2013. Target, the large US retail company had all of their payment card terminals in their stores compromised. These had malware installed on them. That enabled them to steal up to 40 million payment card details from customers over the Black Friday weekend and subsequent shopping weeks leading up to Christmas.</p>
<h3>What did the hackers do?</h3>
<p>What had happened was, the criminals sent a phishing email to the Heating, Ventilation, Air Conditioning maintenance company that Target used. They compromised their computers there. They were able to find the network logon ID and password for the work order processing and invoicing system for Target. The criminals were then able to use those logon details to be able to gain access to Target systems and spread the malware.</p>
<p>So that&#8217;s what can happen to small businesses who have big customers.</p>
<p>Moral of the story: Small businesses do need to have good security in place too.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>. We can also talk to you about best practice for security in your #SmallBusiness in order to prevent you becoming a Supply Chain Risk.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-041-supply-chain-risk/">#WeekendWisdom 041 Supply Chain Risk</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-041-lo.mp4" length="24580973" type="video/mp4" />

			</item>
	</channel>
</rss>
