{"id":8578,"date":"2020-06-22T12:45:06","date_gmt":"2020-06-22T12:45:06","guid":{"rendered":"https:\/\/sterling.com\/?p=8578"},"modified":"2020-06-22T12:45:06","modified_gmt":"2020-06-22T12:45:06","slug":"secure-supply-chain-blog","status":"publish","type":"post","link":"https:\/\/sterling.com\/stargazer\/?p=8578","title":{"rendered":"Know Your Resellers to Ensure a Secure Supply Chain"},"content":{"rendered":"<p><span data-contrast=\"auto\">As threats continue to grow around a <\/span><span data-contrast=\"auto\">secure supply chain<\/span><span data-contrast=\"auto\">, reducing the potential for risks is paramount\u00a0<\/span><span data-contrast=\"auto\">when\u00a0<\/span><span data-contrast=\"auto\">procuring products and services.\u00a0 The reseller environment can be most vulnerable if risk assessment and appropriate vetting of vendors do not receive the attention it should.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Security<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">is still the number one concern of the Federal Government and CIO\u2019s alike<\/span><span data-contrast=\"auto\">.\u00a0 As a pain point, how do you mitigate that risk with an effective strategy?\u00a0 Sterling\u2019s Sr. Vice President and Secure Supply Chain advocate, Jeff Moore, has spent more than 17 years<\/span><span data-contrast=\"auto\">\u00a0procuring technology in the Federal\u00a0<\/span><span data-contrast=\"auto\">government.<\/span><span data-contrast=\"auto\">\u00a0\u00a0<\/span><span data-contrast=\"auto\">With an extensive knowledge of the reseller risks and necessary measures required by the Federal government and military procurement staff, Moore led a task force that focused on a wide array of potential threats ranging from, cyber-attacks to counterfeit or gray market products<\/span><span data-contrast=\"auto\">. Gray market products, while often low cost and easy to access, may\u00a0<\/span><span data-contrast=\"auto\">contain malicious software that could access\u00a0<\/span><span data-contrast=\"auto\">and\u00a0<\/span><span data-contrast=\"auto\">endanger protected data and\/or<\/span><span data-contrast=\"auto\">\u00a0financial information.<\/span><span data-contrast=\"auto\">\u00a0 Moore outlines these risks in a recent <a href=\"https:\/\/www.meritalk.com\/articles\/know-your-resellers-sterlings-jeff-moore-discusses-securing-the-channel\/\"><strong>Q &amp; A with MeriTalk<\/strong><\/a><\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Minimizing risk is always the goal.\u00a0 As a reseller who works with the government and varying industries,\u00a0<\/span><span data-contrast=\"auto\">companies like Sterling take action to protect customers.\u00a0\u00a0<\/span><span data-contrast=\"auto\">Moore states that, \u201c<\/span><span data-contrast=\"auto\">m<\/span><span data-contrast=\"auto\">easures<\/span><span data-contrast=\"auto\"> should be taken to protect customers from\u00a0<\/span><span data-contrast=\"auto\">t<\/span><span data-contrast=\"auto\">he potential for cyber threats, whether phishing attempts or ransomware to counterfeit or gray market products with malicious code<\/span><span data-contrast=\"auto\">\u00a0and\u00a0<\/span><span data-contrast=\"auto\">econo<\/span><span data-contrast=\"auto\">m<\/span><span data-contrast=\"auto\">i<\/span><span data-contrast=\"auto\">c<\/span><span data-contrast=\"auto\">\u00a0threats like theft of intellectual property<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">are some that customers may face if supply chain security measures are not taken.<\/span><span data-contrast=\"auto\">\u00a0These threats all come with varying degrees of complexity and unique risks.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As a reseller,\u00a0<\/span><span data-contrast=\"auto\">companies like Sterling,<\/span><span data-contrast=\"auto\">\u00a0connect the OEM<\/span><span data-contrast=\"auto\">,\u00a0<\/span><span data-contrast=\"auto\">vendor<\/span><span data-contrast=\"auto\">,\u00a0<\/span><span data-contrast=\"auto\">to the end-user, customer.\u00a0 <\/span><span data-contrast=\"auto\">This is a great resource for\u00a0<\/span><span data-contrast=\"auto\">customers who require multiple vendors to fulfill their procurement requirements.\u00a0 A convenient, one point of contact approach to access multiple vendors, make<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">\u00a0a reseller model such as Sterling, so desirable to government agencies and businesses alike.\u00a0\u00a0<\/span><span data-contrast=\"auto\">Thus,<\/span><span data-contrast=\"auto\">\u00a0the reason a secure supply chain model is firmly in place.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Large OEM\u2019s have secure supply chain practices o<\/span><span data-contrast=\"auto\">f<\/span><span data-contrast=\"auto\">\u00a0their own<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0but providing a comprehensive Supply Chain Risk Management (SCRM)\u00a0<\/span><span data-contrast=\"auto\">plan at the reseller level provides an<\/span><span data-contrast=\"auto\">\u00a0additional layer of risk assessment<\/span><span data-contrast=\"auto\">.\u00a0 This<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">will<\/span><span data-contrast=\"auto\">\u00a0protect all involved to ensure that your reseller\u00a0<\/span><span data-contrast=\"auto\">isn\u2019t<\/span><span data-contrast=\"auto\">\u00a0just a couple of guys, setting up shop in a garage with a website.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The Federal Government and critical infrastructure owners and operators spend $500B annual<\/span><span data-contrast=\"auto\">ly<\/span><span data-contrast=\"auto\">\u00a0on Information and Communication Technology (ICT), procuring from thousands of suppliers of all size<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">.\u00a0\u00a0<\/span><span data-contrast=\"auto\">Meritalk<\/span><span data-contrast=\"auto\">\u00a0recently published an article<\/span><span data-contrast=\"auto\"> outlining new and more stringent risk mitigation procedures that will continue to protect our three largest Federal Departments.\u00a0 These include Defense (DoD<\/span><span data-contrast=\"auto\">)<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Commerce<\/span><span data-contrast=\"auto\">\u00a0(<\/span><span data-contrast=\"auto\">DoC<\/span><span data-contrast=\"auto\">), and the Cybersecurity and Infrastructure Security Agency (CISA) in the Department of Homeland Security.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Moore states, \u201cYou have to know your resellers. It starts with more time educating and training contracting officers and buyers to look beyond just the bill of materials and part number.\u201d\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW97558403 BCX7\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW97558403 BCX7\">Risk and vulnerability exist within the Federal Government as well as, commercial business alike, which would potentially compromise network security and datacenters<\/span><\/span><span class=\"TextRun SCXW97558403 BCX7\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW97558403 BCX7\">\u00a0that house classified or confidential information.<\/span><\/span><span class=\"TextRun SCXW97558403 BCX7\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW97558403 BCX7\">\u00a0Without a secure supply chain where hardware, software, and network solutions and OEMs have been vetted, the vulnerability of a remote attack on those systems would result in unforeseen expenses<\/span><\/span><span class=\"TextRun Strikethrough SCXW97558403 BCX7\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW97558403 BCX7\">.<\/span><\/span><span class=\"TextRun SCXW97558403 BCX7\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW97558403 BCX7\">\u00a0\u00a0Mitigating a cyber-attack or breach would require replacing compromised hardware, time, and manpower that could disrupt or halt operations or critical missions. \u00a0Once the damage has been done, it cannot be resolved. \u00a0A breach of classified or proprietary data could be a matter of national security and hinder business continuity. \u00a0Moral of the story, know your reseller.<\/span><\/span><span class=\"TextRun SCXW97558403 BCX7\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW97558403 BCX7\">\u00a0Moore and Sterling advocate fiercely to maintain a true secure supply chain<\/span><\/span><span class=\"TextRun Underlined SCXW97558403 BCX7\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW97558403 BCX7\">.<\/span><\/span><span class=\"TextRun SCXW97558403 BCX7\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW97558403 BCX7\">\u00a0<\/span><\/span><span class=\"TextRun SCXW97558403 BCX7\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW97558403 BCX7\">Sterling is O-TTPS Certified (Open Trusted Technology Provider Standard Certification), CMMC certified and has a detailed Supply Chain Risk Management (SCRM) plan in place so customers can be assured of secure product procurement.<\/span><\/span><span class=\"EOP SCXW97558403 BCX7\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>Read more from Sterling Sr. VP, Jeff Moore, on secure supply chain <strong><a href=\"https:\/\/www.hstoday.us\/subject-matter-areas\/infrastructure-security\/our-collective-responsibility-to-secure-the-reseller-channel-from-cyber-threats\/\">here published by Homeland Security Today.u<\/a>s<\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As threats continue to grow around a secure supply chain, reducing the potential for risks is paramount\u00a0when\u00a0procuring products and services.\u00a0 The reseller environment can be most vulnerable if risk assessment [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8584,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,13,32,15,11,17],"tags":[],"class_list":["post-8578","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcements","category-blog","category-client","category-data-center","category-news","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Know Your Resellers to Ensure a Secure Supply Chain - Sterling<\/title>\n<meta name=\"description\" content=\"As threats continue to grow around\u00a0\u00a0secure supply chain, reducing the potential for risks is paramount\u00a0when\u00a0procuring products and services.\u00a0\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Know Your Resellers to Ensure a Secure Supply Chain - Sterling\" \/>\n<meta property=\"og:description\" content=\"As threats continue to grow around\u00a0\u00a0secure supply chain, reducing the potential for risks is paramount\u00a0when\u00a0procuring products and services.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sterling.com\/stargazer\/?p=8578\" \/>\n<meta property=\"og:site_name\" content=\"Sterling\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/SterlingComp\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-22T12:45:06+00:00\" \/>\n<meta name=\"author\" content=\"Sterling\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:site\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sterling\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=8578#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=8578\"},\"author\":{\"name\":\"Sterling\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/person\\\/b812a18f3a1e77cd0925429d1546e49d\"},\"headline\":\"Know Your Resellers to Ensure a Secure Supply Chain\",\"datePublished\":\"2020-06-22T12:45:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=8578\"},\"wordCount\":690,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=8578#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Announcements\",\"Blog\",\"Client\",\"Data Center\",\"News\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=8578\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=8578\",\"name\":\"Know Your Resellers to Ensure a Secure Supply Chain - Sterling\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=8578#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=8578#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2020-06-22T12:45:06+00:00\",\"description\":\"As threats continue to grow around\u00a0\u00a0secure supply chain, reducing the potential for risks is paramount\u00a0when\u00a0procuring products and services.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=8578#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=8578\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=8578#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=8578#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Know Your Resellers to Ensure a Secure Supply Chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#website\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\",\"name\":\"Sterling\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\",\"name\":\"Sterling\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Sterling-Computers-Logo-TM.png\",\"contentUrl\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Sterling-Computers-Logo-TM.png\",\"width\":399,\"height\":145,\"caption\":\"Sterling\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/facebook.com\\\/SterlingComp\\\/\",\"https:\\\/\\\/x.com\\\/sterlingcomp\",\"https:\\\/\\\/www.instagram.com\\\/sterlingcomputers\\\/\",\"http:\\\/\\\/youtube.com\\\/@sterlingcomp\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/sterling-computers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/person\\\/b812a18f3a1e77cd0925429d1546e49d\",\"name\":\"Sterling\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"caption\":\"Sterling\"},\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Know Your Resellers to Ensure a Secure Supply Chain - Sterling","description":"As threats continue to grow around\u00a0\u00a0secure supply chain, reducing the potential for risks is paramount\u00a0when\u00a0procuring products and services.\u00a0","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Know Your Resellers to Ensure a Secure Supply Chain - Sterling","og_description":"As threats continue to grow around\u00a0\u00a0secure supply chain, reducing the potential for risks is paramount\u00a0when\u00a0procuring products and services.\u00a0","og_url":"https:\/\/sterling.com\/stargazer\/?p=8578","og_site_name":"Sterling","article_publisher":"http:\/\/facebook.com\/SterlingComp\/","article_published_time":"2020-06-22T12:45:06+00:00","author":"Sterling","twitter_card":"summary_large_image","twitter_creator":"@sterlingcomp","twitter_site":"@sterlingcomp","twitter_misc":{"Written by":"Sterling","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sterling.com\/stargazer\/?p=8578#article","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/?p=8578"},"author":{"name":"Sterling","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/b812a18f3a1e77cd0925429d1546e49d"},"headline":"Know Your Resellers to Ensure a Secure Supply Chain","datePublished":"2020-06-22T12:45:06+00:00","mainEntityOfPage":{"@id":"https:\/\/sterling.com\/stargazer\/?p=8578"},"wordCount":690,"commentCount":0,"publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/?p=8578#primaryimage"},"thumbnailUrl":"","articleSection":["Announcements","Blog","Client","Data Center","News","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sterling.com\/stargazer\/?p=8578","url":"https:\/\/sterling.com\/stargazer\/?p=8578","name":"Know Your Resellers to Ensure a Secure Supply Chain - Sterling","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sterling.com\/stargazer\/?p=8578#primaryimage"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/?p=8578#primaryimage"},"thumbnailUrl":"","datePublished":"2020-06-22T12:45:06+00:00","description":"As threats continue to grow around\u00a0\u00a0secure supply chain, reducing the potential for risks is paramount\u00a0when\u00a0procuring products and services.\u00a0","breadcrumb":{"@id":"https:\/\/sterling.com\/stargazer\/?p=8578#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sterling.com\/stargazer\/?p=8578"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/?p=8578#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/sterling.com\/stargazer\/?p=8578#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sterling.com\/stargazer\/"},{"@type":"ListItem","position":2,"name":"Know Your Resellers to Ensure a Secure Supply Chain"}]},{"@type":"WebSite","@id":"https:\/\/sterling.com\/stargazer\/#website","url":"https:\/\/sterling.com\/stargazer\/","name":"Sterling","description":"","publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sterling.com\/stargazer\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sterling.com\/stargazer\/#organization","name":"Sterling","url":"https:\/\/sterling.com\/stargazer\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/","url":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","contentUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","width":399,"height":145,"caption":"Sterling"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/SterlingComp\/","https:\/\/x.com\/sterlingcomp","https:\/\/www.instagram.com\/sterlingcomputers\/","http:\/\/youtube.com\/@sterlingcomp","https:\/\/www.linkedin.com\/company\/sterling-computers"]},{"@type":"Person","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/b812a18f3a1e77cd0925429d1546e49d","name":"Sterling","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","caption":"Sterling"},"url":"https:\/\/sterling.com\/stargazer\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts\/8578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8578"}],"version-history":[{"count":0,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts\/8578\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}