We use cookies to provide you with a better experience. By continuing to browse the site you are agreeing to our use of cookies in accordance with our Cookie Policy.
  • INDUSTRY PRESS ROOM
  • ABOUT
  • CONTACT
  • MEDIA FILE
  • Create Account
  • Sign In
  • Sign Out
  • My Account
Free Newsletters
  • MAGAZINE
    • Current Issue
    • Archives
    • Digital Edition
    • Subscribe
    • Newsletters
    • Mobile Apps
  • TRANSPORTATION
  • MATERIAL HANDLING
  • TECHNOLOGY
  • LIFT TRUCKS
  • PODCAST ETC
    • Podcast
    • Webcasts
    • Blogs
      • One-Off Sound Off
      • Global Logistics and Risk
      • Empowering Your Performance Edge
      • Analytics & Big Data
      • Submit your blog post
    • Events
    • White Papers
    • Industry Press Room
      • Upload Your News
    • New Products
      • Upload Your Product News
    • Conference Guides
    • Conference Reports
    • Newsletters
    • Mobile Apps
  • DCV-TV
    • DCV-TV 1: News
    • DCV-TV 2: Case Studies
    • DCV-TV 3: Webcasts
    • DCV-TV 4: Viewer Contributed
    • DCV-TV 5: Solution Profiles
    • Parcel Forum 2022
    • MODEX 2022
    • Upload Your Video
  • MAGAZINE
    • Current Issue
    • Archives
    • Digital Edition
    • Subscribe
    • Newsletters
    • Mobile Apps
  • TRANSPORTATION
  • MATERIAL HANDLING
  • TECHNOLOGY
  • LIFT TRUCKS
  • PODCAST ETC
    • Podcast
    • Webcasts
    • Blogs
      • One-Off Sound Off
      • Global Logistics and Risk
      • Empowering Your Performance Edge
      • Analytics & Big Data
      • Submit your blog post
    • Events
    • White Papers
    • Industry Press Room
      • Upload Your News
    • New Products
      • Upload Your Product News
    • Conference Guides
    • Conference Reports
    • Newsletters
    • Mobile Apps
  • DCV-TV
    • DCV-TV 1: News
    • DCV-TV 2: Case Studies
    • DCV-TV 3: Webcasts
    • DCV-TV 4: Viewer Contributed
    • DCV-TV 5: Solution Profiles
    • Parcel Forum 2022
    • MODEX 2022
    • Upload Your Video
Home » Beware: Cyberwolves on the prowl
techwatch

Beware: Cyberwolves on the prowl

December 19, 2011
James A. Cooke
No Comments

Last spring's earthquake and tsunami in Japan served as a powerful reminder of the fragility of today's far-flung global supply chains. So it's no surprise that logistics and supply chain managers are focusing renewed attention on plans to keep distribution and supply networks up and running in the event of a disaster. While most will be concentrating on things like the supply base and physical infrastructure, there's something else these managers should keep in mind as they draft their risk mitigation strategies: their information technology network.

That's the view of Dennis Omanoff, a senior vice president and chief supply officer at McAfee Inc., a firm that provides Internet security and antivirus services. Omanoff thinks logistics and supply chain managers should be paying more attention to what they can do to keep products flowing in the event of a cyberattack on the IT network that binds their supply chain together.

Internet security threats are on the rise, according to Omanoff. So far this year, McAfee has identified 14 million different kinds of malware, malicious software intended to disarm or disable computers. (Think viruses, worms, and Trojan horses.) As for how malware infiltrates corporate computer servers, McAfee said e-mail is the most common mode of transmission.

In the past, most cyberattacks were the work of lonewolf hackers, but that's no longer the case, Omanoff says. Criminal gangs seeking access to confidential data are going after corporate information systems. There's also been a rise in state-sponsored cyberattacks such as "Operation Aurora" in December 2009 that struck information systems at a number of U.S. companies. (Although never proven, many experts believe the Chinese government was behind Operation Aurora.) "Now you have nation states trying to use cyber terrorism to gain access," says Omanoff.

Although nation states are more likely to target government or military computers, or even commmercial transportation or power grids, Omanoff says they're also taking aim at corporate and global commercial networks. Supply chain information networks might well be on their list of targets, he says, adding that the attackers would be looking to steal intellectual property or confidential data.

What can a company do to protect its information networks? Omanoff recommends starting with a security audit to ensure the corporate supply chain information network hasn't been breached. He also advises companies to require suppliers to have a data loss protection plan in place that includes regular monitoring of the possible loss of any confidential data.

As a further safeguard against data theft, Omanoff recommends that American companies "buy American"—that is, purchase only computer hardware assembled in the United States. He believes companies should be "nervous" about computers built in countries with totalitarian regimes that might intentionally embed malware code in the hardware. "I worry about the deliberate intrusion onto my hardware of a piece of malware that might give someone access to critical infrastructure," says Omanoff.

Omanoff warns that in the future, companies will have to start becoming become more selective and cautious about where they buy their computer gear. For instance, that might mean using only vendors who are able to "obfuscate" the end user's identity when they go to buy parts and components from their own suppliers. In any case, he says, companies should only buy computer hardware from sellers in which they have complete confidence. "You have to buy from a trusted source," he says.

Technology
  • Related Articles

    New kids on the LMS block

    To get the best deal on software, create uncertainty

    hey! you! Get on the cloud

Jamescooke
James Cooke is a principal analyst with Nucleus Research in Boston, covering supply chain planning software. He was previously the editor of CSCMP?s Supply Chain Quarterly and a staff writer for DC Velocity.

Recent Articles by James Cooke

Getting smart about using software intelligence

Where's the payback in software?

R is for "robot": interview with Tom Bonkenburg

You must login or register in order to post a comment.

Report Abusive Comment

Most Popular Articles

  • Schneider welcomes first battery-electric truck

  • Fred Smith is not worried about Amazon

  • Outlook 2023: What’s in store for logistics/supply chain?

  • Ports, maritime operators see tide turning as ocean freight tsunami subsides

  • In Person: Steve Beverly of Penske

Now Playing on DCV-TV

Eeafd0c7 0569 4a63 8b31 fdbc5322c7cd

Crown’s DualMode Automated Forklifts Revolutionize the Warehouse

DCV-TV 4: Viewer Contributed
As part of the company’s ongoing digitization efforts, DHL Supply Chain has deployed Crown’s DualMode automated reach trucks to help ensure resiliency in the supply chain, with reach trucks available 24/7/365. “AGVs provide a better quality of life for our associates on the floor,” says Gordon Hanthorn, Senior...

FEATURED WHITE PAPERS

  • The five best applications for robotic lift trucks in warehouse environments

  • Fulfillment Facility Improved Efficiencies by 4x

  • 3PLs: Complete Orders Faster with Flexible Automation

  • Reusable Packaging for the New Wave of Supply Chain Automation

View More

Subscribe to DC Velocity Magazine

GET YOUR FREE SUBSCRIPTION
  • SUBSCRIBE
  • NEWSLETTERS
  • ADVERTISING
  • CUSTOMER CARE
  • CONTACT
  • ABOUT
  • STAFF
  • PRIVACY POLICY

Copyright ©2023. All Rights ReservedDesign, CMS, Hosting & Web Development :: ePublishing