{"id":50871,"date":"2023-04-12T10:11:43","date_gmt":"2023-04-12T14:11:43","guid":{"rendered":"https:\/\/insi.net\/?p=50871"},"modified":"2023-04-12T10:11:43","modified_gmt":"2023-04-12T14:11:43","slug":"cyber-security-risks","status":"publish","type":"post","link":"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/","title":{"rendered":"Supply Chain Cybersecurity Risks: Your Clients, Your Vendors, and You!"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Supply Chain Cybersecurity Risks are the Biggest Threat to Your Business Relationships!\u00a0<\/span>The average hacker has complete access to your network nine months before being detected. <\/span><\/p>\n

That is nine months of a cybercriminal digging into your financials, human resources information, and intellectual property!\u00a0 Further, if your business is storing, accessing, or transmitting client or patient data, you are legally responsible for securing those records. As a result, clients, prospects, and patients will view you as a security risk for sensitive information if you have a breach.<\/span><\/p>\n

Cybersecurity is Now Affordable for SMBs<\/span><\/h1>\n

In the past, managed security was unaffordable to SMBs. However, managed security cost decreased significantly in recent years, and technology has advanced tremendously. Therefore, small- and medium-sized businesses no longer rely on the basic block and tackle security techniques<\/a>. Instead, they can now armor their network with the most advanced cybersecurity<\/a> measures.<\/span><\/p>\n

Are You Responsible for Your Clients\u2019 Data?<\/h2>\n

In today’s world, many businesses are entrusted with sensitive information that belongs to another company. For this reason, supply-chain cybersecurity has become mandatory for vendors who access, transmit, or store sensitive data for enterprise or government entities.\u00a0<\/span><\/p>\n

Regulated industries like health and finance require vendor risk assessments. Examples include the Healthcare Insurance Portability and Accountability Act (HIPAA) and Graham-Leach- Bliley Act GLBA.\u00a0\u00a0<\/span><\/p>\n

You should also take precautions if your business captures the following individuals’ personal information:<\/span>
\u2022 Credit Card\/Debit Card Information<\/span>
\u2022 Social Security Numbers<\/span>
\u2022 Phone Numbers<\/span>
\u2022 Addresses<\/span>
\u2022 Drivers License Number<\/span>
\u2022 Passwords<\/span>
\u2022 Banking Information<\/span>
\u2022 Your employees\u2019 personal information<\/span><\/p>\n

It is good practice to think through all the companies you share this information with, such as telemarketers, HR companies, data analysts, etc. It is critical to ensure your vendors safeguard your company\u2019s sensitive information.<\/span><\/p>\n

Georgia State Security Breach Notification<\/h2>\n

A<\/span>ll 50 states have implemented Security Breach Notification Laws that require businesses to notify individuals when a breach involves personally identifiable information. Specifically, Georgia Security Breach Notification Law<\/a> lists the data types that make individuals most vulnerable. Additional requirements state a company “shall notify the information broker or data collector of any breach of the security of the system within 24 hours following the discovery.”<\/p>\n

Therefore, it is not only good practice to perform a Risk Assessment on yourself but also insists that every vendor you share sensitive information does as well. Regardless of who is at fault for the breach, your employees and clients will ultimately hold you responsible if you do not do your due diligence.<\/p>\n

Root Cause of Most Cyber Security Data Breaches<\/h2>\n

Negligent employees and contractors account for 62% of all data breaches. The Ponemon Institute<\/a> 2022 Cost of Insider Threats: Global Report reveals that threat incidents have increased 44% over the past two years, with cost per incident up more than a third to $15.38 million.<\/span><\/h4>\n

<\/span><\/p>\n

INSI Can Help Protect Your Data<\/h2>\n

Fortunately, you do not have to go through this alone. INSI has comprehensive Managed Security packages to help protect your sensitive data. Examples include:
\u2022
Security Information & Event Management (SIEM)<\/a> – 24\/7 real-time threat monitoring, event correlation, and incident response.
\u2022
End-Point Managed Detection & Remediation (MDR)<\/a> – The next level of antivirus analyzes and monitors device events, detect threats, stops the threat, and guides you to remediation.
\u2022 Risk Assessments – Identify your network strengths, weaknesses, opportunities, and threats (SWOT) by using policy-based frameworks.
\u2022 INSI Complete Security Package – includes a security audit, network security vulnerability assessment, semi-annual security check, biannual penetration test, phishing email test and training, quarterly security checks, staff training, antivirus monitoring, web content filtering, web protection, and spam protection.\u00a0<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.17.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.17.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_text=”Connect With INSI” _builder_version=”4.17.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.17.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.17.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.17.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

INSI: The Best MSP in Atlanta!<\/h2>\n

Innovative Network Systems, Inc. has a unique approach to integrating IT support<\/a> and cybersecurity<\/a>. Our month-to-month programs range from basic support to proactive support, managed support, and customized support. Each program is tailored to the client’s needs and internal IT strengths.\u00a0\u00a0<\/p>\n

For more information about cybersecurity dangers and the preventative measures for your company, connect with the top MSP in Atlanta; Contact INSI: 770-387-2424, option 2 or click the link below. In addition, we offer 16 different cybersecurity programs<\/a>\u00a0to protect you and your data.<\/p>\n

About the Author<\/h3>\n

Deborah Frazier<\/a>\u00a0is the author of\u00a0IT Outsourcing Secrets \u2013 A Small Business Guide to Compare IT Support Companies.<\/em><\/strong> With nearly 20 years of experience consulting small and medium-sized businesses on their IT support needs, she brings a wealth of knowledge to INSI as Head of Marketing and Sales. If you like this article and want to get notified when a new article is posted, click here<\/a>.<\/p>\n

To make an appointment for more information about INSI and our Marietta and Atlanta metro IT Support services, click here<\/a>.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

Supply Chain Cybersecurity Risks are the Biggest Threat to Your Business Relationships!\u00a0The average hacker has complete access to your network nine months before being detected. That is nine months of a cybercriminal digging into your financials, human resources information, and intellectual property!\u00a0 Further, if your business is storing, accessing, or transmitting client or patient data, […]<\/p>\n","protected":false},"author":3,"featured_media":57142,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[27,18],"tags":[12,38,31,49,60,50,51,39,40,41,42,52,53,43,21,24,25,56,44,54,55],"yoast_head":"\nSupply Chain Cybersecurity Risks: contact top IT Atlanta support company<\/title>\n<meta name=\"description\" content=\"Supply Chain Cybersecurity Risks: your top IT Atlanta support company can protect your data and your client's data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Supply Chain Cybersecurity Risks: contact top IT Atlanta support company\" \/>\n<meta property=\"og:description\" content=\"Supply Chain Cybersecurity Risks: your top IT Atlanta support company can protect your data and your client's data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"INSI's Integrated IT Support & Cybersecurity Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-12T14:11:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insi.net\/wp-content\/uploads\/2020\/09\/Supply-Chain-Cybersecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"922\" \/>\n\t<meta property=\"og:image:height\" content=\"608\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Deborah Frazier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Deborah Frazier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/\"},\"author\":{\"name\":\"Deborah Frazier\",\"@id\":\"https:\/\/insi.net\/#\/schema\/person\/b120a1ff6fd1f1a92fc022dc1cb176c3\"},\"headline\":\"Supply Chain Cybersecurity Risks: Your Clients, Your Vendors, and You!\",\"datePublished\":\"2023-04-12T14:11:43+00:00\",\"dateModified\":\"2023-04-12T14:11:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/\"},\"wordCount\":919,\"publisher\":{\"@id\":\"https:\/\/insi.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insi.net\/wp-content\/uploads\/2020\/09\/Supply-Chain-Cybersecurity.png\",\"keywords\":[\"Cyber Security\",\"IT Services\",\"IT support\",\"IT support company\",\"IT support company in Atlanta\",\"IT support company in Atlanta GA\",\"IT support company in Marietta\",\"IT support in Atlanta\",\"IT support in Atlanta GA\",\"IT support in Marietta\",\"IT support in Marietta GA\",\"IT support provider\",\"managed it services\",\"managed it support services\",\"managed security\",\"Managed Service Provider\",\"Managed Services\",\"Managed Support\",\"msp\",\"MSPs\",\"MSPs Atlanta\"],\"articleSection\":[\"Cyber Security\",\"INSI Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/\",\"url\":\"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/\",\"name\":\"Supply Chain Cybersecurity Risks: contact top IT Atlanta support company\",\"isPartOf\":{\"@id\":\"https:\/\/insi.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insi.net\/wp-content\/uploads\/2020\/09\/Supply-Chain-Cybersecurity.png\",\"datePublished\":\"2023-04-12T14:11:43+00:00\",\"dateModified\":\"2023-04-12T14:11:43+00:00\",\"description\":\"Supply Chain Cybersecurity Risks: your top IT Atlanta support company can protect your data and your client's data.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/#primaryimage\",\"url\":\"https:\/\/insi.net\/wp-content\/uploads\/2020\/09\/Supply-Chain-Cybersecurity.png\",\"contentUrl\":\"https:\/\/insi.net\/wp-content\/uploads\/2020\/09\/Supply-Chain-Cybersecurity.png\",\"width\":922,\"height\":608,\"caption\":\"Supply Chain Cybersecurity\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insi.net\/#website\",\"url\":\"https:\/\/insi.net\/\",\"name\":\"INSI - Innovative Network Systems, Inc.\",\"description\":\"Atlanta Metro's best integrated IT Support and Cybersecurity Solution with a competitively priced flat rate model. No hidden fees, & all local college-educated engineers\",\"publisher\":{\"@id\":\"https:\/\/insi.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insi.net\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/insi.net\/#organization\",\"name\":\"INSI - Innovative Network Systems, Inc.\",\"url\":\"https:\/\/insi.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insi.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/insi.net\/wp-content\/uploads\/2023\/10\/cropped-INSITlogo_favicon-1.jpg\",\"contentUrl\":\"https:\/\/insi.net\/wp-content\/uploads\/2023\/10\/cropped-INSITlogo_favicon-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"INSI - Innovative Network Systems, Inc.\"},\"image\":{\"@id\":\"https:\/\/insi.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/innovative-network-systems-inc.\",\"https:\/\/www.youtube.com\/channel\/UCDsB8ePL69nOZX5Y_3jzniA\/featured\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/insi.net\/#\/schema\/person\/b120a1ff6fd1f1a92fc022dc1cb176c3\",\"name\":\"Deborah Frazier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insi.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/beac7a52631d8638d3a1dca572342a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/beac7a52631d8638d3a1dca572342a2d?s=96&d=mm&r=g\",\"caption\":\"Deborah Frazier\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Supply Chain Cybersecurity Risks: contact top IT Atlanta support company","description":"Supply Chain Cybersecurity Risks: your top IT Atlanta support company can protect your data and your client's data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/","og_locale":"en_US","og_type":"article","og_title":"Supply Chain Cybersecurity Risks: contact top IT Atlanta support company","og_description":"Supply Chain Cybersecurity Risks: your top IT Atlanta support company can protect your data and your client's data.","og_url":"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/","og_site_name":"INSI's Integrated IT Support & Cybersecurity Solutions","article_published_time":"2023-04-12T14:11:43+00:00","og_image":[{"width":922,"height":608,"url":"https:\/\/insi.net\/wp-content\/uploads\/2020\/09\/Supply-Chain-Cybersecurity.png","type":"image\/png"}],"author":"Deborah Frazier","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Deborah Frazier","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/#article","isPartOf":{"@id":"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/"},"author":{"name":"Deborah Frazier","@id":"https:\/\/insi.net\/#\/schema\/person\/b120a1ff6fd1f1a92fc022dc1cb176c3"},"headline":"Supply Chain Cybersecurity Risks: Your Clients, Your Vendors, and You!","datePublished":"2023-04-12T14:11:43+00:00","dateModified":"2023-04-12T14:11:43+00:00","mainEntityOfPage":{"@id":"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/"},"wordCount":919,"publisher":{"@id":"https:\/\/insi.net\/#organization"},"image":{"@id":"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/insi.net\/wp-content\/uploads\/2020\/09\/Supply-Chain-Cybersecurity.png","keywords":["Cyber Security","IT Services","IT support","IT support company","IT support company in Atlanta","IT support company in Atlanta GA","IT support company in Marietta","IT support in Atlanta","IT support in Atlanta GA","IT support in Marietta","IT support in Marietta GA","IT support provider","managed it services","managed it support services","managed security","Managed Service Provider","Managed Services","Managed Support","msp","MSPs","MSPs Atlanta"],"articleSection":["Cyber Security","INSI Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/","url":"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/","name":"Supply Chain Cybersecurity Risks: contact top IT Atlanta support company","isPartOf":{"@id":"https:\/\/insi.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/#primaryimage"},"image":{"@id":"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/insi.net\/wp-content\/uploads\/2020\/09\/Supply-Chain-Cybersecurity.png","datePublished":"2023-04-12T14:11:43+00:00","dateModified":"2023-04-12T14:11:43+00:00","description":"Supply Chain Cybersecurity Risks: your top IT Atlanta support company can protect your data and your client's data.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insi.net\/insi-articles\/cyber-security-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insi.net\/insi-articles\/cyber-security-risks\/#primaryimage","url":"https:\/\/insi.net\/wp-content\/uploads\/2020\/09\/Supply-Chain-Cybersecurity.png","contentUrl":"https:\/\/insi.net\/wp-content\/uploads\/2020\/09\/Supply-Chain-Cybersecurity.png","width":922,"height":608,"caption":"Supply Chain Cybersecurity"},{"@type":"WebSite","@id":"https:\/\/insi.net\/#website","url":"https:\/\/insi.net\/","name":"INSI - Innovative Network Systems, Inc.","description":"Atlanta Metro's best integrated IT Support and Cybersecurity Solution with a competitively priced flat rate model. No hidden fees, & all local college-educated engineers","publisher":{"@id":"https:\/\/insi.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insi.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/insi.net\/#organization","name":"INSI - Innovative Network Systems, Inc.","url":"https:\/\/insi.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insi.net\/#\/schema\/logo\/image\/","url":"https:\/\/insi.net\/wp-content\/uploads\/2023\/10\/cropped-INSITlogo_favicon-1.jpg","contentUrl":"https:\/\/insi.net\/wp-content\/uploads\/2023\/10\/cropped-INSITlogo_favicon-1.jpg","width":512,"height":512,"caption":"INSI - Innovative Network Systems, Inc."},"image":{"@id":"https:\/\/insi.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/innovative-network-systems-inc.","https:\/\/www.youtube.com\/channel\/UCDsB8ePL69nOZX5Y_3jzniA\/featured"]},{"@type":"Person","@id":"https:\/\/insi.net\/#\/schema\/person\/b120a1ff6fd1f1a92fc022dc1cb176c3","name":"Deborah Frazier","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insi.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/beac7a52631d8638d3a1dca572342a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/beac7a52631d8638d3a1dca572342a2d?s=96&d=mm&r=g","caption":"Deborah Frazier"}}]}},"_links":{"self":[{"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/posts\/50871"}],"collection":[{"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/comments?post=50871"}],"version-history":[{"count":0,"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/posts\/50871\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/media\/57142"}],"wp:attachment":[{"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/media?parent=50871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/categories?post=50871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/tags?post=50871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}