4 things you can do to minimize cyberattacks on supply and value chains

How can your organization protect itself from data breach by affected third parties in your supply or value chain? Apart from “basics” such as enforcing least privilege for third-party users and forcing administrative password resets on initial use (to avoid “username:admin, password:admin” scenarios), below are four unique and effective ways your organization can mitigate access-related third-party risk.

Read full article on Help Net Security

 


Date:

Categorie(s):