Header image

Supply Chain Attack Haunt UK's FTSE 100

UK businesses exposed to supply chain attacks via third and fourth party breaches.

Almost all of the UK’s FTSE 100 businesses were exposed to supply chain breaches in the last year.

According to research by Security Scorecard, 97% of companies in the UK have a breached entity in their third-party ecosystem, and a breached party in their fourth-party ecosystem.

The report claimed fourth-party vendors create as significant a risk as third parties, who typically receive most of the supply chain scrutiny.

These threats underscore the importance of identifying and assessing the security posture of all parties in a company’s digital ecosystem, as a vendor experiencing a third or fourth-party compromise could affect a large number of its customers, or even customers of its customers, in one fell swoop.


Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Upcoming Events

08
Aug
Webinar

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image image