Hermes Barometer: IT and data security in the supply chain
This is precisely the topic addressed by the 16th Hermes Barometer. In spring 2022, 150 logistics managers in German companies were surveyed on “IT and data security in the supply chain”.
More than half of the companies surveyed see computer viruses and hacker attacks as the greatest threats to their supply chains. Compared to 2017, this assessment increased by more than 10%. Actually, affected by disruptions or outages due to IT security incidents were already 13% of these companies.
According to the respondents, the most effective protective measures within the digital supply chain require areas such as data and data transfers (56%). Above all, data from customers and employees is a particular focus here. The automated exchange of data with suppliers and partners is also particularly vulnerable to attacks, say around 41%. Around a third rate the use of online payment systems and IT-supported warehousing as a risk for security incidents.
Companies trust their own security mechanisms
Nearly three-quarters (72%) of logistics decision makers surveyed said their companies have the expertise to protect themselves from cyber-attacks. The companies rely primarily on their own IT departments; only a few have special cyber security experts.
However, it must be remembered that securing a company’s own IT environment is often not enough. Due to increasing networking, the systems of cooperation partners should also be subjected to critical scrutiny. Transparent supply chains and information about partners’ security standards are the key to success here. However, only 33% of large companies have sufficient information about these areas.
What security measures are companies taking?
The highest priority for 67% of respondents is securing the company network against data leakage. 57% consider the encryption of network connections and e-mails to be an effective measure. Large companies in particular also see a positive effect in informing and training management and employees in this area. At the moment, active supply chain risk management including software still plays a subordinate role. Surprisingly, this is only a priority for 21% of respondents.
IT and data security in warehouse logistics – KHT is ideally equipped
Over the past 24 months, we have continued to invest heavily in the security of our products in order to provide our customers with comprehensive protection against cyber-attacks in the future.
The interfaces we offer for our products can be secured in several ways:
- by integrating KHT products into the customer’s IT infrastructure, so that products and software packages can be secured via the customer’s existing security structures.
- by providing an upload option for the customer’s own certificates for network interfaces such as web services and TCP/IP interfaces.
- by a completely autarkic operation of the KHT products, if desired, in order to allow access neither online nor locally.
Depending on the requirements, our customers therefore have the option of using their own existing security measures, just as they do with their existing clients or software packages. In this way, all traffic can be verified and recorded.
With our standard interfaces, our customers have the great advantage that self-issued certificates known to them can be managed. Thus, all connections are SSL-encrypted and secured via the issuer’s certificates.
Cf. Hermes, 16. Hermes Barometer, IT- und Datensicherheit: Die Sorge von Unternehmen vor Cyberangriffen auf Lieferketten nimmt zu, accessed 11.08.2022