{"id":126,"date":"2020-01-21T06:41:32","date_gmt":"2020-01-21T06:41:32","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=126"},"modified":"2020-02-05T08:26:41","modified_gmt":"2020-02-05T08:26:41","slug":"hack-once-hurt-many","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/hack-once-hurt-many\/","title":{"rendered":"Hack once, hurt many"},"content":{"rendered":"\n<p>How do you know that the critical parts inside your servers and devices  are not poor quality, ready to fail at a crucial moment? Or, worse, hide  malware with nefarious intentions like key-stroke logging, data theft,  or sabotage? <\/p>\n\n\n\n<p>Supply chain attacks are actually two kinds of threats. The first \nseeks to disrupt or cripple actual supply chains. Think of nation-state \nassaults on key infrastructure or energy systems.<\/p>\n\n\n\n<p>But others use supply chains as a channel to attack dozens, hundreds,  or potentially thousands of connected partners. By finding and  exploiting weak links, attackers can hop between linked entities,  stealing data, and spying or destroying as they go. This is what makes  the attacks so dangerous \u2014 and attractive for hackers.<a href=\"https:\/\/venturebeat.com\/2020\/01\/08\/5-reasons-why-supply-chain-security-must-be-on-your-agenda\/\"> Read More<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed    solutions to automated, manage threat intelligence, forensic    investigations and cyber security training. Our objective is to support    organisations and consumers at every step of their cyber maturity    journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a>  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>How do you know that the critical parts inside your servers and devices are not poor quality, ready to fail at a crucial moment? Or, worse, hide malware with nefarious intentions like key-stroke logging, data theft, or sabotage? Supply chain attacks are actually two kinds of threats. The first seeks to disrupt or cripple actual &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/hack-once-hurt-many\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Hack once, hurt many&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[16,17],"tags":[],"class_list":["post-126","post","type-post","status-publish","format-standard","hentry","category-cyber-crime","category-cyber-risk"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=126"}],"version-history":[{"count":2,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/126\/revisions"}],"predecessor-version":[{"id":158,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/126\/revisions\/158"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}