It’s early 2018, and the world’s largest ID database, Aadhaar, suffers a breach, exposing information on more than 1.1 billion people. Last year, 10 million current and former Optus customers had personal information stolen in a hack. In the last month, Fortescue Metals Group suffered its own data breach, as did Deutsche Bank through one of its external service providers.
Oh, and were you one of the 90% of LinkedIn users who had their data stolen and posted on a dark web forum back in 2021?
The common theme here is, of course, cybersecurity. For procurement teams worldwide, it’s a massive concern and the number one priority. Why is this? And how do you prioritise it effectively?
From the Internet of Things to Big Data analytics, SaaS to Blockchain Technology and RPA, the supply chain is becoming increasingly digitised. The advantages are obvious. AI and machine learning are far more capable of collating and sorting huge streams of data that all procurement teams must deal with, and it also takes mundane, repetitive tasks out of human hands, allowing human minds to focus on strategy and innovation.
But the more data we have on ‘the cloud’, the more vulnerable it is to breaches and hacks. In the first quarter of 2023, more than six million data records were exposed worldwide. According to IBM Security, 83% of organisations experience more than one breach, and the cost of a data breach rose to US$4.35 million in 2022.
But money is one thing. Here are other, equally serious consequences of data breaches.
What are the consequences of poor cybersecurity?
C-suite are well aware of the concerns around poor cybersecurity. They are a driving force behind making it a priority for procurement when conducting third-party risk assessments. But how exactly can procurement go about effectively prioritising cybersecurity in future buying decisions?
How do you know what effective cybersecurity measures look like? Do you know how to enforce them in a contract? Do you know how to run an audit of cybersecurity practices? What we’re seeing in procurement is some organisations starting with IT security as a first step criterion. For suppliers who don’t pass the IT security requirements it’s a no-go for even getting a start in the procurement process.
The steps outlined above are easier said than done. Cybersecurity is one of those priorities that may force procurement to seek external advice, whether that’s from the IT department, the legal department or even outside the organisation.
Attempting to enforce cybersecurity with third parties without the required knowledge won’t lead to any effective measures. The first step you need to take is acknowledging your capabilities and then, if necessary, engaging the experts.
One of our main callings at Comprara is helping organisations deal with tremendous amounts of data. Collating it, cleansing it, sorting it, analysing it – and, yes, protecting it. We know how to establish cybersecurity practices within businesses, and within third party risk assessments.
Don’t do everything you know you should to protect your clients and customers, only to be let down by substandard third parties. Know the capabilities of those you are doing business with, and know how to enforce it. Get in touch today for all your cybersecurity concerns.