skip to Main Content

Is instant access to information worth risking our supply chain? Jen Kauffman's Perspective.

April 13, 2020

Elkridge, MD 4/13/2020. Prior to the use of smart phones, TVs, Alexa, and various other smart devices, Supply Chain risks weren’t as common as they are today. Before smart devices, hackers needed people like Aldrich Ames, former Central Intelligence Agency officer turned KGB double agent, who was convicted of espionage in 1994, to physically steal classified and official use information. Now, protecting networks and information from intruders and hackers is a huge priority for businesses and individual users, but they must now react to the changing supply chain landscape.

Typical threats to the supply chain include maliciously tainted software, installation of counterfeit hardware or software, failure or disruption in the production or distribution of a critical product or service, and installation of unintentional vulnerabilities on hardware or software. In business development, it is our responsibility to educate our partners and customers on the importance of having a secure supply chain. Users don’t often realize that putting their personal information on social media, using their cell phones to conduct personal or confidential business, and allowing their phones to access their location and track cookies, gives hackers easier access to attack their supply chain. Items we use daily such as cell phones and TVs have listening software that makes it easier for hackers to listen and access your personal information.

To combat access to information, CyberCore Technologies takes necessary steps to secure the supply chain through our supply chain risk management process. CyberCore’s risk mitigation process is based on our third-party certified International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) 20243-1:2018 Mitigating Maliciously Tainted Products. We have implemented 37 formal SCRM practices, currently in place around mitigating supply chain risks. Our goal is to ensure we maintain and provide a secure supply chain.

About CyberCore Technologies 

Excellence. Driven. CyberCore Technologies is the leading provider of Secure Supply Chain Management and Cyber Solutions focused on protecting our customer’s environment from external and internal threats using our certified ISO 28000:2007 Supply Chain Risk Management and ISO 20243-1:2018 Mitigating Maliciously Tainted and Counterfeit Products processes.  CyberCore provides full Lifecycle IT and Mission Engineering Services 

Go Deep.Get Answers. Expert supply chain assessment services using machine learning/artificial intelligence techniques to provide analysis in five areas:  cyber-attack surface; nefarious associations and nation state influence; regulatory, sanctions and law; hardware and software risk; and financial risk. 

Problems, We Solve Them. Whether we’re serving our government or corporate clients—working in cyber security, data analysis, IT support, or software development—we have a team that is motivated, professional, and uncompromising. Together, there’s no innovation we can’t imagine, and no mission need we can’t support. For further information on CyberCore, visit 

×Close search