We use cookies to provide you with a better experience. By continuing to browse the site you are agreeing to our use of cookies in accordance with our Cookie Policy.
  • ::COVID-19 COVERAGE::
  • INDUSTRY PRESS ROOM
  • ABOUT
  • CONTACT
  • MEDIA FILE
  • Create Account
  • Sign In
  • Sign Out
  • My Account
Free Newsletters
  • MAGAZINE
    • Current Issue
    • Archives
    • Digital Edition
    • Subscribe
    • Newsletters
    • Mobile Apps
  • TRANSPORTATION
  • MATERIAL HANDLING
  • TECHNOLOGY
  • LIFT TRUCKS
  • PODCAST ETC.
    • Podcast
    • Blogs
      • Analytics & Big Data
      • Best Practices
      • Dispatches
      • Empowering Your Performance Edge
      • Logistics Problem Solving
      • One-Off Sound Off
      • Public Sector Logistics
      • Two Sides of the Logistics Coin
      • Submit your blog post
    • Events
    • White Papers
    • Industry Press Room
      • Upload Your News
    • New Products
      • Upload Your Product News
    • Conference Guides
    • Conference Reports
    • Newsletters
    • Mobile Apps
  • DCV-TV
    • DCV-TV 1: News
    • DCV-TV 2: Case Studies
    • DCV-TV 3: Webcasts
    • DCV-TV 4: Viewer Contributed
    • DCV-TV 5: Solution Profiles
    • MODEX 2020
    • Upload Your Video
  • MAGAZINE
    • Current Issue
    • Archives
    • Digital Edition
    • Subscribe
    • Newsletters
    • Mobile Apps
  • TRANSPORTATION
  • MATERIAL HANDLING
  • TECHNOLOGY
  • LIFT TRUCKS
  • PODCAST ETC.
    • Podcast
    • Blogs
      • Analytics & Big Data
      • Best Practices
      • Dispatches
      • Empowering Your Performance Edge
      • Logistics Problem Solving
      • One-Off Sound Off
      • Public Sector Logistics
      • Two Sides of the Logistics Coin
      • Submit your blog post
    • Events
    • White Papers
    • Industry Press Room
      • Upload Your News
    • New Products
      • Upload Your Product News
    • Conference Guides
    • Conference Reports
    • Newsletters
    • Mobile Apps
  • DCV-TV
    • DCV-TV 1: News
    • DCV-TV 2: Case Studies
    • DCV-TV 3: Webcasts
    • DCV-TV 4: Viewer Contributed
    • DCV-TV 5: Solution Profiles
    • MODEX 2020
    • Upload Your Video
Home » Beware: Cyberwolves on the prowl
techwatch

Beware: Cyberwolves on the prowl

December 19, 2011
James A. Cooke
No Comments

Last spring's earthquake and tsunami in Japan served as a powerful reminder of the fragility of today's far-flung global supply chains. So it's no surprise that logistics and supply chain managers are focusing renewed attention on plans to keep distribution and supply networks up and running in the event of a disaster. While most will be concentrating on things like the supply base and physical infrastructure, there's something else these managers should keep in mind as they draft their risk mitigation strategies: their information technology network.

That's the view of Dennis Omanoff, a senior vice president and chief supply officer at McAfee Inc., a firm that provides Internet security and antivirus services. Omanoff thinks logistics and supply chain managers should be paying more attention to what they can do to keep products flowing in the event of a cyberattack on the IT network that binds their supply chain together.

Internet security threats are on the rise, according to Omanoff. So far this year, McAfee has identified 14 million different kinds of malware, malicious software intended to disarm or disable computers. (Think viruses, worms, and Trojan horses.) As for how malware infiltrates corporate computer servers, McAfee said e-mail is the most common mode of transmission.

In the past, most cyberattacks were the work of lonewolf hackers, but that's no longer the case, Omanoff says. Criminal gangs seeking access to confidential data are going after corporate information systems. There's also been a rise in state-sponsored cyberattacks such as "Operation Aurora" in December 2009 that struck information systems at a number of U.S. companies. (Although never proven, many experts believe the Chinese government was behind Operation Aurora.) "Now you have nation states trying to use cyber terrorism to gain access," says Omanoff.

Although nation states are more likely to target government or military computers, or even commmercial transportation or power grids, Omanoff says they're also taking aim at corporate and global commercial networks. Supply chain information networks might well be on their list of targets, he says, adding that the attackers would be looking to steal intellectual property or confidential data.

What can a company do to protect its information networks? Omanoff recommends starting with a security audit to ensure the corporate supply chain information network hasn't been breached. He also advises companies to require suppliers to have a data loss protection plan in place that includes regular monitoring of the possible loss of any confidential data.

As a further safeguard against data theft, Omanoff recommends that American companies "buy American"—that is, purchase only computer hardware assembled in the United States. He believes companies should be "nervous" about computers built in countries with totalitarian regimes that might intentionally embed malware code in the hardware. "I worry about the deliberate intrusion onto my hardware of a piece of malware that might give someone access to critical infrastructure," says Omanoff.

Omanoff warns that in the future, companies will have to start becoming become more selective and cautious about where they buy their computer gear. For instance, that might mean using only vendors who are able to "obfuscate" the end user's identity when they go to buy parts and components from their own suppliers. In any case, he says, companies should only buy computer hardware from sellers in which they have complete confidence. "You have to buy from a trusted source," he says.

Technology
  • Related Articles

    New kids on the LMS block

    hey! you! Get on the cloud

    To get the best deal on software, create uncertainty

Jamescooke
James Cooke is a principal analyst with Nucleus Research in Boston, covering supply chain planning software. He was previously the editor of CSCMP?s Supply Chain Quarterly and a staff writer for DC Velocity.

Recent Articles by James Cooke

Getting smart about using software intelligence

Where's the payback in software?

R is for "robot": interview with Tom Bonkenburg

You must login or register in order to post a comment.

Report Abusive Comment

Most Popular Articles

  • Cold chain giant Lineage Logistics buys its own rail operator

  • Outlook 2021: What’s in store for logistics supply chain?

  • Cushman & Wakefield Brokers Sale of 170 Acres plus Lease for 1MSF Build-to-Suit for Home Improvement Retailer in Commerce City, CO.

  • Thriving in the long haul: interview with Colin Yankee

  • Capacity challenges will continue in 2021

Now Playing on DCV-TV

2mw 01 18 21 thumb

LTL Carriers Using Yield Management Techniques to Identify New Accessorial Charges

DCV-TV 4: Viewer Contributed
As we head into 2021, shippers are not too optimistic about negotiating rates with their carriers. The reason for this, as highlighted in the three CODE RED Webcasts we've hosted with our friends from CSCMP and NASSTRAC, is that in today's transportation marketplace, shippers are operating in uncharted waters. With...

FEATURED WHITE PAPERS

  • Proven Benefits: A Compendium of Slotting Optimization Success Snapshots

  • Bridging Information Gaps in Dock and Yard Operations

  • How Intelligent Sensor Solutions Turn Data Into Action

  • Order picking Solutions: Understanding Your Options

View More

Subscribe to DC Velocity Magazine

GET YOUR FREE SUBSCRIPTION
  • SUBSCRIBE
  • NEWSLETTERS
  • ADVERTISING
  • CUSTOMER CARE
  • CONTACT
  • ABOUT
  • STAFF
  • PRIVACY POLICY

Copyright ©2021. All Rights ReservedDesign, CMS, Hosting & Web Development :: ePublishing