{"id":19779,"date":"2023-05-15T09:57:15","date_gmt":"2023-05-15T14:57:15","guid":{"rendered":"https:\/\/sterling.com\/?p=19779"},"modified":"2023-05-15T09:57:15","modified_gmt":"2023-05-15T14:57:15","slug":"the-sterling-scoop-secure-supply-chain","status":"publish","type":"post","link":"https:\/\/sterling.com\/stargazer\/?p=19779","title":{"rendered":"The Sterling Scoop: Secure Supply Chain"},"content":{"rendered":"<p>Two years ago, over a holiday weekend, a major cyberattack disrupted the Colonial Pipeline, shaking the United States\u2019 Energy Sector to its core.<\/p>\n<p>The Colonial Pipeline Company, one of the largest oil distributors in the U.S., was hacked by malicious cybercriminals, who forced their way into the company\u2019s private IT network and subsequently stole over 100 gigabytes of data via ransomware\u2014all within a scant two hours. In an effort to mitigate the effects of the breach, Colonial opted to shut down their pipeline altogether, the only viable option for stemming the ransomware\u2019s spread.<\/p>\n<p>A dependable supply chain is, of course, critical to the Energy Sector and to its ability to power our lives. If (and when) that supply chain becomes compromised, the economy, the environment, and public safety itself can suffer. In this instance, the Colonial Pipeline was only shut down for six days, yet the crisis nevertheless resulted in emergency declarations across several states, fuel rationing and panic buying at the pump, and\u2014nationwide\u2014skyrocketing gas prices. Clearly, the impact of this single cyberattack was anything but slight.<\/p>\n<p>Some cybercriminals\u2014as we saw with those who targeted the Colonial Pipeline\u2014<em>affect<\/em> the supply chain with their attacks, while others <em>use<\/em> the supply chain itself in order to execute their nefarious schemes. How so? Through compromised and\/or vulnerable technology products and solutions, especially those sourced through unverified channels, what\u2019s known as the gray market. Within these off-brand or refurbished devices, any number of threats can lie in wait. Some may have undergone direct tampering or interference from a hostile nation-state. Other products may simply be end-of-life (EOL), or might rely on components that are now obsolete, posing a more benign\u2014though no less serious\u2014risk to those who choose to employ such products within their infrastructure. In a similar vein, software applications can also prove troublesome if not properly vetted; built-in malware aside, certain software dependencies can lead to inherent vulnerabilities within your network, which can then later be exploited by any number of bad actors.<\/p>\n<p>Thus, supply chain integrity is paramount across the board, and its prioritization is a worthwhile pursuit, one that helps protect your entire technology environment from disruptions and threats.<\/p>\n<div class=\"ql-divider\" contenteditable=\"false\">\n<hr \/>\n<\/div>\n<p>A secure supply chain, therefore, should be a top priority for any organization seeking to procure IT hardware, software, or other solutions. Conducting regular internal reviews to identify potential vulnerabilities is a critical task, as is authenticating your suppliers and enacting the proper safeguards to keep your distribution network safe.<\/p>\n<p>Sterling, for its part, takes a rigid stance on the gray market and works only with those vendors\/distributors who are authorized. We\u2019re committed to preserving national security through these efforts, but also to ensuring that customers across all market segments remain compliant and secure. Specifically, we\u2019ve made numerous investments into industry certifications as well as built-out a robust, Zero Trust methodology.<\/p>\n<p>A few of those investments include a(n):<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0Open Trusted Technology Provider\u2122 Standard (O-TTPS) Certification<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0ISO 9001 Certification<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0Detailed Supply Chain Risk Management (SCRM) Plan<\/p>\n<div class=\"ql-divider\" contenteditable=\"false\">\n<hr \/>\n<\/div>\n<p><a href=\"https:\/\/sterling.com\/stargazer\/contact-information\/?utm_source=linkedin&amp;utm_medium=social&amp;utm_campaign=ScoopMay\" target=\"_blank\" rel=\"noopener nofollow\">Contact us today<\/a>\u00a0to ensure you\u2019re sourcing your IT solutions via a secure supply chain!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two years ago, over a holiday weekend, a major cyberattack disrupted the Colonial Pipeline, shaking the United States\u2019 Energy Sector to its core. The Colonial Pipeline Company, one of the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":19780,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,63],"tags":[],"class_list":["post-19779","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-sterling-scoop"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Sterling Scoop: Secure Supply Chain - Sterling<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Sterling Scoop: Secure Supply Chain - Sterling\" \/>\n<meta property=\"og:description\" content=\"Two years ago, over a holiday weekend, a major cyberattack disrupted the Colonial Pipeline, shaking the United States\u2019 Energy Sector to its core. The Colonial Pipeline Company, one of the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sterling.com\/stargazer\/?p=19779\" \/>\n<meta property=\"og:site_name\" content=\"Sterling\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/SterlingComp\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-15T14:57:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/05\/My-project-3-1-copy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sterling Scoop\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:site\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sterling Scoop\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sterling.com\/stargazer\/?p=19779#article\",\"isPartOf\":{\"@id\":\"https:\/\/sterling.com\/stargazer\/?p=19779\"},\"author\":{\"name\":\"Sterling Scoop\",\"@id\":\"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/c4fda6d2480f74b4d7056b55a19ce64c\"},\"headline\":\"The Sterling Scoop: Secure Supply Chain\",\"datePublished\":\"2023-05-15T14:57:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sterling.com\/stargazer\/?p=19779\"},\"wordCount\":529,\"publisher\":{\"@id\":\"https:\/\/sterling.com\/stargazer\/#organization\"},\"image\":{\"@id\":\"https:\/\/sterling.com\/stargazer\/?p=19779#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/05\/My-project-3-1-copy.jpg\",\"articleSection\":[\"Blog\",\"Sterling Scoop\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sterling.com\/stargazer\/?p=19779\",\"url\":\"https:\/\/sterling.com\/stargazer\/?p=19779\",\"name\":\"The Sterling Scoop: Secure Supply Chain - Sterling\",\"isPartOf\":{\"@id\":\"https:\/\/sterling.com\/stargazer\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sterling.com\/stargazer\/?p=19779#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sterling.com\/stargazer\/?p=19779#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/05\/My-project-3-1-copy.jpg\",\"datePublished\":\"2023-05-15T14:57:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sterling.com\/stargazer\/?p=19779#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sterling.com\/stargazer\/?p=19779\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sterling.com\/stargazer\/?p=19779#primaryimage\",\"url\":\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/05\/My-project-3-1-copy.jpg\",\"contentUrl\":\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/05\/My-project-3-1-copy.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sterling.com\/stargazer\/?p=19779#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sterling.com\/stargazer\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Sterling Scoop: Secure Supply Chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sterling.com\/stargazer\/#website\",\"url\":\"https:\/\/sterling.com\/stargazer\/\",\"name\":\"Sterling\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sterling.com\/stargazer\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sterling.com\/stargazer\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sterling.com\/stargazer\/#organization\",\"name\":\"Sterling\",\"url\":\"https:\/\/sterling.com\/stargazer\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png\",\"contentUrl\":\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png\",\"width\":399,\"height\":145,\"caption\":\"Sterling\"},\"image\":{\"@id\":\"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/facebook.com\/SterlingComp\/\",\"https:\/\/x.com\/sterlingcomp\",\"https:\/\/www.instagram.com\/sterlingcomputers\/\",\"http:\/\/youtube.com\/@sterlingcomp\",\"https:\/\/www.linkedin.com\/company\/sterling-computers\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/c4fda6d2480f74b4d7056b55a19ce64c\",\"name\":\"Sterling Scoop\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/83ad267322e262c2cfe8b0575c7063a43dc2e56d52b18856192b9398c8aa8583?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/83ad267322e262c2cfe8b0575c7063a43dc2e56d52b18856192b9398c8aa8583?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/83ad267322e262c2cfe8b0575c7063a43dc2e56d52b18856192b9398c8aa8583?s=96&d=mm&r=g\",\"caption\":\"Sterling Scoop\"},\"url\":\"https:\/\/sterling.com\/stargazer\/?author=3\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Sterling Scoop: Secure Supply Chain - Sterling","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Sterling Scoop: Secure Supply Chain - Sterling","og_description":"Two years ago, over a holiday weekend, a major cyberattack disrupted the Colonial Pipeline, shaking the United States\u2019 Energy Sector to its core. The Colonial Pipeline Company, one of the [&hellip;]","og_url":"https:\/\/sterling.com\/stargazer\/?p=19779","og_site_name":"Sterling","article_publisher":"http:\/\/facebook.com\/SterlingComp\/","article_published_time":"2023-05-15T14:57:15+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/05\/My-project-3-1-copy.jpg","type":"image\/jpeg"}],"author":"Sterling Scoop","twitter_card":"summary_large_image","twitter_creator":"@sterlingcomp","twitter_site":"@sterlingcomp","twitter_misc":{"Written by":"Sterling Scoop","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sterling.com\/stargazer\/?p=19779#article","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/?p=19779"},"author":{"name":"Sterling Scoop","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/c4fda6d2480f74b4d7056b55a19ce64c"},"headline":"The Sterling Scoop: Secure Supply Chain","datePublished":"2023-05-15T14:57:15+00:00","mainEntityOfPage":{"@id":"https:\/\/sterling.com\/stargazer\/?p=19779"},"wordCount":529,"publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/?p=19779#primaryimage"},"thumbnailUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/05\/My-project-3-1-copy.jpg","articleSection":["Blog","Sterling Scoop"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sterling.com\/stargazer\/?p=19779","url":"https:\/\/sterling.com\/stargazer\/?p=19779","name":"The Sterling Scoop: Secure Supply Chain - Sterling","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sterling.com\/stargazer\/?p=19779#primaryimage"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/?p=19779#primaryimage"},"thumbnailUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/05\/My-project-3-1-copy.jpg","datePublished":"2023-05-15T14:57:15+00:00","breadcrumb":{"@id":"https:\/\/sterling.com\/stargazer\/?p=19779#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sterling.com\/stargazer\/?p=19779"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/?p=19779#primaryimage","url":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/05\/My-project-3-1-copy.jpg","contentUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/05\/My-project-3-1-copy.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/sterling.com\/stargazer\/?p=19779#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sterling.com\/stargazer\/"},{"@type":"ListItem","position":2,"name":"The Sterling Scoop: Secure Supply Chain"}]},{"@type":"WebSite","@id":"https:\/\/sterling.com\/stargazer\/#website","url":"https:\/\/sterling.com\/stargazer\/","name":"Sterling","description":"","publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sterling.com\/stargazer\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sterling.com\/stargazer\/#organization","name":"Sterling","url":"https:\/\/sterling.com\/stargazer\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/","url":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","contentUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","width":399,"height":145,"caption":"Sterling"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/SterlingComp\/","https:\/\/x.com\/sterlingcomp","https:\/\/www.instagram.com\/sterlingcomputers\/","http:\/\/youtube.com\/@sterlingcomp","https:\/\/www.linkedin.com\/company\/sterling-computers"]},{"@type":"Person","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/c4fda6d2480f74b4d7056b55a19ce64c","name":"Sterling Scoop","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/83ad267322e262c2cfe8b0575c7063a43dc2e56d52b18856192b9398c8aa8583?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83ad267322e262c2cfe8b0575c7063a43dc2e56d52b18856192b9398c8aa8583?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/83ad267322e262c2cfe8b0575c7063a43dc2e56d52b18856192b9398c8aa8583?s=96&d=mm&r=g","caption":"Sterling Scoop"},"url":"https:\/\/sterling.com\/stargazer\/?author=3"}]}},"_links":{"self":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts\/19779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=19779"}],"version-history":[{"count":0,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts\/19779\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/media\/19780"}],"wp:attachment":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=19779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=19779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=19779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}