Insight

Guarding against cyberthreats

January 2017
Download Full Report

The business world is awash with threats to the confidentiality, integrity, and availability of data. Many of the most notorious attacks on corporations originated in the IT systems of suppliers and partners, or in internet-connected devices such as printers and cameras. Businesses can and should do more to protect their critical digital assets—and gain a durable competitive advantage.

At a glance

  • Most companies share data links with partners and suppliers that make them more efficient and innovative but also more vulnerable to attack.
  • Data risk is a corporate-wide issue, not just an IT concern.
  • To protect their external supply chains, leading organizations are mapping data flows, assessing their overall information security, aligning with emerging standards, and setting clear expectations with suppliers.  
  • Suppliers, meanwhile, are proactively working with their customers to improve communication and protect themselves from unwittingly enabling hackers.
  • Suppliers that maintain high levels of security may be able to leverage their credentials to gain favorable terms in future contracts.

Meet the Authors