We would like to keep you up to date with the latest news from Digitalisation World by sending you push notifications.
Attacks where global businesses are affected through their contractors have become a clear trend. Business data is typically distributed across multiple third parties including service providers, partners, suppliers, and subsidiaries. As such, organisations need to consider not only the cybersecurity risks affecting their IT infrastructure but those that can come from outside it.
According to the survey, almost a third (28%) of large organisations in Europe suffered attacks involving data shared with suppliers. This number hasn’t changed significantly since the 2020 report (when it was at 29%). The financial impact has also risen since last year when it was at $839k .
In Europe specifically, cryptomining attacks were the most harmful in terms of financial impact with losses of $2.1 million, ransomware attacks were in second place with a financial impact of $2.07million. The third most impactful data breach for organisations in Europe was inappropriate IT resource use by employees with a financial impact of $2.04million.
The average financial impact of any attack has also increased as a result. It showed a notable 31% increase compared to last year’s results – $1.1 million in 2021 versus $839k in 2020 – and increased 17% from the figure in 2017 ($938k).
“The severity of cybersecurity attacks highlights the need for organisations to take the risk of a breach involving shared data with suppliers into account, when assessing cybersecurity needs for their businesses. The pandemic has changed the threat landscape and organsations should be ready to adapt to it. Companies should grade their suppliers based on the type of work they do and complexity of access they receive (whether they deal with sensitive data and infrastructure or not), and apply security requirements accordingly. Companies should ensure they only share data with reliable third parties and extend their existing security requirements to suppliers. In the case of sensitive data or information transfers it means that all documentation and certifications (such as SOC 2) should be requested from suppliers to confirm they can work at such level. In very sensitive cases, additionally we recommend conducting a preliminary compliance audit of a supplier before signing any contract,” comments Evgeniya Naumova, Executive VP, Corporate Business at Kaspersky.