This Site Requires JavaScript Enabled.
Toolkits
  • IN Individuals Toolkit
  • SB Small Business Toolkit
  • ET Elections Toolkit
  • JO Journalists Toolkit
  • MBO Mission-Based Toolkit
Small Business / Training
The Need for Supply Chain Security
By Craig Moss - Cyber Readiness Institute
05/05/21

The SolarWinds hack may be the largest and most damaging cybersecurity incident in history. SolarWinds is an IT management software company whose software is used by thousands of customers.

Hackers, suspected to be Russian, used SolarWinds as a gateway to access hundreds of other companies and government agencies, including the U.S. State Department, Department of Homeland Security, and the Commerce Department as well as tech heavyweights Cisco Systems and Intel.
This is a perfect example of why supply chain cybersecurity is so critical. SolarWinds was not the ultimate target. It was systematically used as a gateway to access high-value targets.

The lesson for SMEs: Never think you don’t need to worry about cybersecurity! Never think you’re safe because your enterprise is too small or you don’t have anything hackers would want.

To restate what should be obvious: In today’s inter-connected digital world, every organization of any size is a potential target. Hackers seek the path of least resistance and will go through you to get at your bank or your payroll company or your customers or suppliers.
Here are some basic things you should immediately do to protect yourself. Share these tips with your employees and with any company in your business network. We need to work together to improve cybersecurity for all.

  • Passphrases: Immediately change your passwords to 15-character passphrases. It has been reported that some employees at SolarWinds were using “solarwinds123” as their password. Don’t make it easy for hackers to crack your passwords.
  • Multi-factor authentication: Use it any time it is offered. If it is not offered, consider switching to a software or service that does offer it.
  • Phishing: Do refresher training for employees on how to spot a phishing email or text. The email may even look like it is coming from another person in your company. Reinforce the message to never open an attachment or link if at all suspicious. Contact the person through alternative channels to verify it is real.
  • Devices: Review what devices your employees are using to connect to your network. If they are using personal devices, make sure they follow your rules about passphrases and software updates.

It is urgent for all companies to develop a culture of cybersecurity. Start today by building awareness among your employees. Push them to develop good cyber habits. It is critical to your company and to every person and company you touch. Change behavior – Be Cyber Ready.

By Craig Moss, Director of Content and Tool Development, Cyber Readiness Institute.

Editorial comment: The Solarwinds Blog of January 11th 2021 shows that the initial compromise took place in September 2019. The impact and activities remained undiscovered until December 2020. https://orangematter.solarwinds.com/2021/01/11/new-findings-from-our-investigation-of-sunburst/

Back to Blog Next Post
  • About
  • Community Forum
  • Submit a Tool
  • Privacy Policy
  • Terms of Service
  • Legal Notice
  • Artificial Intelligence Policy
    and Disclosure
  • Invest in Us

Copyright @ 2025 Global Cyber Alliance | Sitemap

Scroll to top

Tool Types

Third Party Tool
Policy Document
Instructions
Third Party Scan
Video

Time

“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.

Tool Levels

Level 1

Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.

Level 2

Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.

Level 3

Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.

Level 4

Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.

Support

Contact Us
[email protected]

Community Forum
https://community.globalcyberalliance.org/