Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Guess Who’s Hiding in Your Supply Chain 

Hackers don’t always come knocking at the front door.

Many organisations are unwittingly leaving a virtual welcome mat with a key beneath it at access points across their supply chain. A lack of visibility in an organisation’s supply chain can leave vulnerable entry points exposed for bad actors and open an organisation up to unnecessary risk. 

One of the most prolific attacks in 2024, for example, was on the NHS when cyber criminals targeted its pathology services provider Synnovis, resulting in over 1,000 NHS operations postponed in the weeks that followed. Examples like this are becoming increasingly common. In fact, it’s predicted that nearly half of organisations worldwide will have experienced attacks on their software supply chains by 2025.  

Without a unified approach to identity security with visibility across all identities – whether employee, third-party or machine in place – organisations can face disastrous consequences. Protecting the business from cybercriminals should be a top priority for IT and business leaders, especially as the number of threats facing UK organisations grow in scale and severity. It’s for this reason that stringent control over who has access to what is essential – no matter where on the supply chain the identity falls. 

“Knock, knock” – Who’s there? A complex web of identities 

It’s easy to fathom that businesses are made up of full-time and part-time employees. But with the rise of the gig economy in recent years, non-employees such as freelancers, contractors and temporary workers now play a regular role in everyday business operations. To avoid gaps in cyber security posture, organisations must take action in order to fully recognise the non-employees in their supply chain.  

Moreover, it’s not just human identities that companies need to consider. With the rise of AI, companies are dealing with an explosion of machine identities, such as software bots and robotic process automation. In fact, SailPoint research shows that nearly seven in ten (69%) of companies now manage more machine identities than human identities, with 57% admitting that a machine identity has been granted inappropriate access to sensitive data. Without proper oversight on who can access what, when, why and for how long, it makes it nearly impossible to secure the organisation and its wider supply chain. 

Overprovisioned access: a hidden threat 

As organisations grapple with these increasingly complex identity structures, managing and securing access to applications and data has become more challenging. The explosion of unstructured data, such as spreadsheets, emails, and multimedia files, further complicates visibility and ownership, often resulting in excessive access permissions that create vulnerabilities. These permissions make it easier for cybercriminals to exploit weaknesses.

Our research shows that nearly four in five have experienced security issues due to improper access. The rapid growth of identities and data has led organisations to prioritise ease of internal access over security, resulting in overprovisioned identities. This overprovisioning enables attackers to move laterally through networks undetected, gaining access to a wide range of data, which they can encrypt or steal.

Hackers crashing the party 

There are plenty of high-profile attacks that demonstrate how hackers use the supply chain to access their target organisation. One of the most notable attacks on a supply chain was on SolarWinds, where hackers deployed malicious code into its IT monitoring and management software, enabling them to reach other companies within the supply chain. Once hackers were inside, they were able to compromise data, networks and systems of thousands of public and private organisations. This included spying on government agencies, in what became a major breach to national security. 

Government departments noticed that sensitive emails were missing from their systems and major private companies such as Microsoft, Intel, and Deloitte were also affected. With internal workings exposed, hackers could also gain access to data and networks of customers and partners of those originally affected, allowing the attack to spiral in impact and affect thousands of organisations. 

Visibility is key to guard against future attacks – without it an organisation can’t effectively or reliably identify suspicious activity. In 2023, on average, breaches were identified 204 days (over 6 months) after the event. When you put this into perspective, it becomes unfathomable the amount of damage a cyber intruder could cause. Security teams must deploy a multi-layered arsenal of tools and tactics to cover their bases and should provision identities with only as much access as is absolutely necessary.  

AI and ML in the arsenal 

Tools empowered with AI and machine learning are essential in today’s digital landscape. Employees, non-employees and machines all need to be vetted in this way – outdated manual processes just won’t cut the mustard when it comes to the vast number of identities that need protecting against fast-evolving cyber threats.  

AI and machine learning can provide advanced threat detection when implemented as part of an identity security solution. Tools empowered with these technologies allow organisations to analyse huge amounts of data at speed – identifying patterns synonymous with potential threat activity. By automating the process of access permissions, organisations can ensure that employees as well as non-employees only have access to the resources they require for their role. We’re already seeing the benefits of this approach, with 83% of organisations reporting fewer identity-related security issues due to their security investments in 2023, according to our findings.  

The dream team: Humans and technology  

Identity security can also enable better collaboration across the business, such as between HR and IT. For example, HR, responsible for recruitment needs and people entering and exiting the organisation, must work carefully with IT to verify people are who they say they are and implement clear processes to ensure communication is consistently maintained. By sharing the details of all users who can access systems – employees as well as freelancers, contractors and other third-party workers – IT can actively control access rights, ensuring none of these identities slip through the cracks. 

In addition to actively monitoring and communicating with one another, HR and IT departments should have automated processes in place to regularly monitor and review access privileges. By utilising automation to assess the cybersecurity practices of third parties, HR can ensure they have the most accurate information before giving IT the green light to grant access to organisational systems. By incorporating background checks, security clearances, or certifications as part of the due diligence process, organisations can better fortify themselves.  

Today’s enterprises can’t afford to just keep their own house in order – they need to make sure their supply chain is protected as well. This means gaining better visibility and control across all identities that fall within their ecosystem – a challenge that will only grow more complex as the volume, variety and velocity of identities continues to increase. Through tools empowered by AI and machine learning, employees will be equipped with the resources they need to execute a thorough identity security approach and defend against threat actors. No more keys under mats – it’s cyber lock boxes from now on.  


About the Author

Steve Bradford is Senior Vice President EMEA at SailPoint. SailPoint equips the modern enterprise to seamlessly manage and secure access to applications and data through the lens of identity – at speed and scale. As a category leader, we continuously reinvent identity security as the foundation of the secure enterprise. SailPoint delivers a unified, intelligent, extensible platform built to defend against today’s dynamic, identity-centric cyber threats while enhancing productivity and efficiency. SailPoint helps many of the world’s most complex, sophisticated enterprises create a secure technology ecosystem that fuels business transformation.

Featured image: Adobe Stock

more insights