Search By Category
An educational piece about the supply chain attack By Jesse Wilson, CISSP, @CyberWarior1775 To start, let’s talk about what the supply chain is in relation to Information Technology. In this case, the supply chain refers to the coordination of order generation; order processing; order fulfillment via the distribution of products, services and/or information; manufacturing; and -- if needed -- warehousing of product(s). For example, we at Structured facilitate and fulfill our customers' IT orders and work with product manufacturers and distributors to ensure delivery of that hardware and software. So, we are a crucial part of the supply chain. We take our role as a solution provider seriously and go to great lengths to ensure our people, processes and technology are up to snuff. Now, let’s look into what the typical IT supply chain looks like in a medium-sized company. We can accomplish this by simply listing an example of common technologies used today: Software – For operating systems, business impact analysis, HR, accounting, legal, etc. Devices and Infrastructure – Next-gen security products, switching/routing, servers, desktops, laptops, wireless systems, mobile devices, etc. IT and Business Services – IT helpdesk ticketing system, CRM, marketing platforms, etc. Emerging Tech – IoT, blockchain,…