You should read this article and understand the points of vulnerability in your supply chain for cyber attacks:
- Aggregators and Service Providers: You may have a process which you are not even aware of where data goes from you to a third party, it is manipulated, then sent back to you. Simple process. But if that third party is not certified and is rendered useless by an attack it can shut your processes down. Think about it this way:
- You are using a third party company to take demand information and create a production forecast and schedule.
- That schedule or forecast is then fed back to you and input into your MRP.
- The third party is attached by cyber criminals
- Your production shuts down.
- Tier II and Tier III Suppliers: There is a reason they are able to cut costs and sell to you cheaper. There is something they no longer are doing. Don't let them compromise on cyber security and you need to follow up and check and check. If their plant goes down, the JIT supply chain goes down with it.
- Think Global: Remember, your suppliers have suppliers in countries you may not be able to point out on a map. Make sure you can map out your supply chain then overlay a heat map of where cyber attacks come from. This will help you identify your vulnerabilities.