ICAEW.com works better with JavaScript enabled.

Supply chain: a cyber vulnerability blind spot

Author: ICAEW Insights

Published: 24 Jun 2024

The supply chain is highlighted as the new frontier for cybercrime. Although activity can be outsourced, responsibility and accountability cannot, experts warn.

UK businesses generally feel confident that they are on top of their cyber security. However, supply chain attacks remain vulnerable blind spots in their programmes, according to RSM’s most recent cyber security report.

Awareness of the risks around cyber security is at its most elevated after a series of high-profile attacks have helped build an appreciation of the risks of getting it wrong. The vast majority of respondents to RSM’s Q1 2024 cyber security survey – 94% – said they felt prepared to respond to a cyber attack.

However, cyber criminals continue to exploit vulnerabilities in third-party systems in order to inflict broader damage across the business ecosystem. Almost three-quarters (74%) of UK IT decision makers received notification of a cyber attack or vulnerability in their software supply chain in the past 12 months, according to new research commissioned by BlackBerry.

A quarter of respondents (26%) to the RSM survey admitted that they had suffered an attack on a key third-party service provider that had impacted their business financially, reputationally or operationally. Of those, 78% of the respondents who had experienced an attack in the past year reported that a supplier or third party was targeted by a threat actor.

Targeting third-party services is an especially attractive approach for criminals, as the economies of scale they could achieve with a successful attack are plentiful. RSM says businesses must be aware of the risks and potential liabilities if a third-party provider they use is compromised. Clear contractual terms are essential when engaging with third parties.

Stuart Leach, a technology and cyber risk assurance partner who leads the national cyber practice across RSM UK, said that although activity can be outsourced, responsibility and accountability for services and data cannot: “Cyber criminals understand that, in targeting third parties who host many clients, they are targeting a very attractive economy of scale. With this, businesses need to be aware of the split of roles, responsibilities with third parties and the liabilities they face if a third-party provider is subject to a successful cyber-attack.”

According to the survey, only 40% of businesses actively maintain a full list of suppliers despite the fact that, as Leach says, to mitigate third-party cyber risks it is crucial that organisations understand their cyber footprint. “This, in essence, is everywhere your data has been, everywhere your data is and where it will be in the future. Moreover, this should be considered from the perspective of data access, processing, transmission and storage,” he said.

To protect themselves, he added, it was essential to have an accurate view of all third parties to drive appropriate supplier management frameworks including due diligence at onboarding, continuous monitoring of critical parties and regular reviews of cyber security measures.

Ian Pay, Head of Data and Analytics at ICAEW, said an organisation’s cyber defences are only as strong as the weakest link. “Crucially it is not just your supplier that will suffer reputational and financial damage – if you cannot service your customers, or any customer or staff data ends up in the wrong hands, it is you who will be held responsible.

“Mitigating this risk is hard but it is vital that companies build an understanding of their supply-chain cyber risks and are willing to have robust conversations with those organisations that play a critical role in their IT infrastructure and data processing/storage. It’s also important when procuring new technology suppliers that cyber security considerations are central to the contracting process.”

Nick Wildgoose, an independent supply chain risk consultant and Fellow of ICAEW and CIPS, agrees that there is not enough understanding of the cyber supply chain. The appropriate flow of information is critical to the successful operation of a supply chain – for example, the documentation to allow appropriate customs clearance.

He says: “It is important that businesses consider cyber protections beyond those offered by end point solutions, that restrict the impact of a successful ransomware attack to the individual user where the breach occurs, rather than impacting all users. There should also be an increasing focus on the software bill of materials so that businesses better understand the code that underlies the applications they are using.”

The RSM survey polled 408 senior executives from UK middle market businesses with a turnover between £10m and £750m or financial institutions with assets under management of £200m to £7.5bn.

More support

The National Cyber Security Centre offers a range of resources to help you understand the impact of supply chain cyber security risks.

In October’s Cyber Security Awareness Month, ICAEW is running a range of articles, webinars and podcasts on the biggest issues in supply chain cyber security. In the meantime, ICAEW’s cyber security hub provides a focal point for ICAEW members looking for support in managing cyber risks

Latest cyber security articles

Further resources

Resources
Cyber Security Awareness month 2023
Cyber security awarness

ICAEW marked the 20th anniversary of global Cyber Security Awareness month with a series of resources to help you know what to do when a cyber attack happens.

Browse resources
ICAEW Community
Data visualisation on a smartphone
Data Analytics

Helping finance professionals develop the advanced data analytics and visualisation skills needed to succeed in this insight-driven era.

Find out more
Elearning
Finance in a Digital World - support for ICAEW members and students on digital transformation and technology
Finance in a Digital World

ICAEW has worked with Deloitte to develop Finance in a Digital World, a suite of online learning modules to support ICAEW members and students, develop awareness and build understanding of digital technologies and their impact on finance.

Open AddCPD icon

Add Verified CPD Activity

Introducing AddCPD, a new way to record your CPD activities!

Log in to start using the AddCPD tool. Available only to ICAEW members.

Add this page to your CPD activity

Step 1 of 3
Download recorded
Download not recorded

Please download the related document if you wish to add this activity to your record

What time are you claiming for this activity?
Mandatory fields

Add this page to your CPD activity

Step 2 of 3
Mandatory field

Add activity to my record

Step 3 of 3
Mandatory field

Activity added

An error has occurred
Please try again

If the problem persists please contact our helpline on +44 (0)1908 248 250