We use cookies to provide you with a better experience. By continuing to browse the site you are agreeing to our use of cookies in accordance with our Cookie Policy.
  • ::COVID-19 COVERAGE::
  • INDUSTRY PRESS ROOM
  • ABOUT
  • CONTACT
  • MEDIA FILE
  • Create Account
  • Sign In
  • Sign Out
  • My Account
Free Newsletters
  • MAGAZINE
    • Current Issue
    • Archives
    • Digital Edition
    • Subscribe
    • Newsletters
    • Mobile Apps
  • TRANSPORTATION
  • MATERIAL HANDLING
  • TECHNOLOGY
  • LIFT TRUCKS
  • PODCAST ETC
    • Podcast
    • Webcasts
    • Blogs
      • One-Off Sound Off
      • Global Logistics and Risk
      • Empowering Your Performance Edge
      • Analytics & Big Data
      • Submit your blog post
    • Events
    • White Papers
    • Industry Press Room
      • Upload Your News
    • New Products
      • Upload Your Product News
    • Conference Guides
    • Conference Reports
    • Newsletters
    • Mobile Apps
  • DCV-TV
    • DCV-TV 1: News
    • DCV-TV 2: Case Studies
    • DCV-TV 3: Webcasts
    • DCV-TV 4: Viewer Contributed
    • DCV-TV 5: Solution Profiles
    • MODEX 2022
    • Upload Your Video
  • MAGAZINE
    • Current Issue
    • Archives
    • Digital Edition
    • Subscribe
    • Newsletters
    • Mobile Apps
  • TRANSPORTATION
  • MATERIAL HANDLING
  • TECHNOLOGY
  • LIFT TRUCKS
  • PODCAST ETC
    • Podcast
    • Webcasts
    • Blogs
      • One-Off Sound Off
      • Global Logistics and Risk
      • Empowering Your Performance Edge
      • Analytics & Big Data
      • Submit your blog post
    • Events
    • White Papers
    • Industry Press Room
      • Upload Your News
    • New Products
      • Upload Your Product News
    • Conference Guides
    • Conference Reports
    • Newsletters
    • Mobile Apps
  • DCV-TV
    • DCV-TV 1: News
    • DCV-TV 2: Case Studies
    • DCV-TV 3: Webcasts
    • DCV-TV 4: Viewer Contributed
    • DCV-TV 5: Solution Profiles
    • MODEX 2022
    • Upload Your Video
Home » Beware: Cyberwolves on the prowl
techwatch

Beware: Cyberwolves on the prowl

December 19, 2011
James A. Cooke
No Comments

Last spring's earthquake and tsunami in Japan served as a powerful reminder of the fragility of today's far-flung global supply chains. So it's no surprise that logistics and supply chain managers are focusing renewed attention on plans to keep distribution and supply networks up and running in the event of a disaster. While most will be concentrating on things like the supply base and physical infrastructure, there's something else these managers should keep in mind as they draft their risk mitigation strategies: their information technology network.

That's the view of Dennis Omanoff, a senior vice president and chief supply officer at McAfee Inc., a firm that provides Internet security and antivirus services. Omanoff thinks logistics and supply chain managers should be paying more attention to what they can do to keep products flowing in the event of a cyberattack on the IT network that binds their supply chain together.

Internet security threats are on the rise, according to Omanoff. So far this year, McAfee has identified 14 million different kinds of malware, malicious software intended to disarm or disable computers. (Think viruses, worms, and Trojan horses.) As for how malware infiltrates corporate computer servers, McAfee said e-mail is the most common mode of transmission.

In the past, most cyberattacks were the work of lonewolf hackers, but that's no longer the case, Omanoff says. Criminal gangs seeking access to confidential data are going after corporate information systems. There's also been a rise in state-sponsored cyberattacks such as "Operation Aurora" in December 2009 that struck information systems at a number of U.S. companies. (Although never proven, many experts believe the Chinese government was behind Operation Aurora.) "Now you have nation states trying to use cyber terrorism to gain access," says Omanoff.

Although nation states are more likely to target government or military computers, or even commmercial transportation or power grids, Omanoff says they're also taking aim at corporate and global commercial networks. Supply chain information networks might well be on their list of targets, he says, adding that the attackers would be looking to steal intellectual property or confidential data.

What can a company do to protect its information networks? Omanoff recommends starting with a security audit to ensure the corporate supply chain information network hasn't been breached. He also advises companies to require suppliers to have a data loss protection plan in place that includes regular monitoring of the possible loss of any confidential data.

As a further safeguard against data theft, Omanoff recommends that American companies "buy American"—that is, purchase only computer hardware assembled in the United States. He believes companies should be "nervous" about computers built in countries with totalitarian regimes that might intentionally embed malware code in the hardware. "I worry about the deliberate intrusion onto my hardware of a piece of malware that might give someone access to critical infrastructure," says Omanoff.

Omanoff warns that in the future, companies will have to start becoming become more selective and cautious about where they buy their computer gear. For instance, that might mean using only vendors who are able to "obfuscate" the end user's identity when they go to buy parts and components from their own suppliers. In any case, he says, companies should only buy computer hardware from sellers in which they have complete confidence. "You have to buy from a trusted source," he says.

Technology
  • Related Articles

    New kids on the LMS block

    hey! you! Get on the cloud

    To get the best deal on software, create uncertainty

Jamescooke
James Cooke is a principal analyst with Nucleus Research in Boston, covering supply chain planning software. He was previously the editor of CSCMP?s Supply Chain Quarterly and a staff writer for DC Velocity.

Recent Articles by James Cooke

Getting smart about using software intelligence

Where's the payback in software?

R is for "robot": interview with Tom Bonkenburg

You must login or register in order to post a comment.

Report Abusive Comment

Most Popular Articles

  • Private equity firm acquires packaging provider Coregistics in e-commerce bet

  • Packaging industry reprioritizes amid inflation, supply chain disruption

  • Warehousing's perfect storm

  • Raymond Corp. marks 100th anniversary

  • Investors see big value in basic wooden pallets

Now Playing on DCV-TV

E3f9e6d5 8bd4 40ca 8c7f 43aa63ea3fc9

Lessons from CSCMP’s Annual Report Card for Shippers and Carriers

DCV-TV 4: Viewer Contributed
Recently, the Council of Supply Chain Management Professionals (CSCMP) released their 33rd Annual State of Logistics Report which is created by AT Kearny. I've viewed this as basically a "Report Card" for shippers and carriers since it offers a comprehensive view of what they both have dealt with in the past year,...

FEATURED WHITE PAPERS

  • Breaking Bad: Conducting Full Truckload RFPs in the Age of Digital Freight Procurement

  • Fueling Sustainability for Manufacturers: Strategies to Increase Fuel Efficiency and Reduce Your Carbon Footprint

  • Guide to Proven Warehouse Solutions

  • Five common misconceptions about running a private fleet

View More

Subscribe to DC Velocity Magazine

GET YOUR FREE SUBSCRIPTION
  • SUBSCRIBE
  • NEWSLETTERS
  • ADVERTISING
  • CUSTOMER CARE
  • CONTACT
  • ABOUT
  • STAFF
  • PRIVACY POLICY

Copyright ©2022. All Rights ReservedDesign, CMS, Hosting & Web Development :: ePublishing