
{"id":623,"date":"2019-08-29T11:03:58","date_gmt":"2019-08-29T11:03:58","guid":{"rendered":"http:\/\/jpaerocom.co.uk\/news\/?p=623"},"modified":"2022-04-08T13:17:49","modified_gmt":"2022-04-08T13:17:49","slug":"cyber-security-military-supply-chain","status":"publish","type":"post","link":"https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/","title":{"rendered":"Cyber security in the military supply chain"},"content":{"rendered":"<p><em>Cyber security is the term used to define security around the electronic medium of digital networks used to store, modify and communicate information. <\/em><\/p>\n<p>With our increasing technological reliance almost every piece of information and data goes through a digital network of some description at some point in time. Everything from calendars, to inventory management, to machinery analytics, to personal data.<\/p>\n<p>All of the associated information with these can be vulnerable unless proper precautions are taken. Think for a moment of the recent scandals surrounding Facebook\u2019s leaked data and the ongoing ramifications of that.<\/p>\n<p>When it comes to the <a href=\"https:\/\/jpaerocom.co.uk\/products\/aerospace-fasteners\/\" target=\"_blank\" rel=\"noopener noreferrer\">military supply chain<\/a>, it becomes a matter of national security. Leaks or cracks in the system can lead to valuable data being stolen and used improperly.<\/p>\n<p>For suppliers to be able to deal with any government military party they need to go through a rigorous security testing to prove all these precautions have been taken. Which is why we are so proud to announce our recently achieved <a href=\"https:\/\/jpaerocom.co.uk\/quality\/data-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Certification<\/a>.<\/p>\n<h2>Cyber Security Concerns<\/h2>\n<h3>Mismanagement of Cloud Access<\/h3>\n<p>The cloud is marvellous. It means accessing data and files from anywhere. It frees up employees to stay up to date with work, and enables remote access so that you can manage and access data wherever you are in the world from any device.<\/p>\n<p>However, it comes at a price. If you can access your files and information from the comfort of your own home; what\u2019s to say that someone else can\u2019t too?<\/p>\n<p>As supply chain management software and data storage systems all move to the cloud, this becomes a real exploitable vulnerability.<\/p>\n<p>Failure to properly manage cloud access can lead to serious IT risks, including providing users with excess privileges, or, worse still, leaving cloud storage repositories open and accessible to anyone.<\/p>\n<p>A cloud solution must include strong permissions and access management.<\/p>\n<h3>Trusting Data To A Third Party Vendor<\/h3>\n<p>Understandably, some companies are reluctant to entrust important data to a third party vendor.<\/p>\n<p>It is thus critical to engage only companies that have experience in dealing with mission critical applications and pass strict security audits.<\/p>\n<p>These companies often have much higher standards, more knowledge of the dangers and risks, and more layers of security than those of the companies whose data they host.<\/p>\n<h3>IoT Compromise<\/h3>\n<p>Devices that connect to the internet, whether that\u2019s sensors, scanners, or driver tracking, are increasingly used throughout the supply chain for everything from predicting machinery maintenance, to inventory management.<\/p>\n<p>However, all of the data that is relayed by any and all of these devices is another attack vector for potential hackers. They could ascertain important information about the supply chain like order volumes, and supplier data and relationships.<\/p>\n<p>IoT devices need to be checked and verified for security and encryption should be implemented at all points in the IoT ecosystem.<\/p>\n<h3>Securing the Supply Chain Overview<\/h3>\n<p>Security is imperative in supply chains, and with increasing technological adoption throughout every part of the supply chain the potential vulnerabilities are increasing too.<\/p>\n<p>Here are six key things to consider when thinking about cyber security:<\/p>\n<ul>\n<li>Secured Internet connection;<\/li>\n<li>Secure all devices and software;<\/li>\n<li>Control access to your data and services;<\/li>\n<li>Enable two factor authentication to all cloud based software;<\/li>\n<li>Protect from viruses and other malware;<\/li>\n<li>Keep your devices and software up to date.<\/li>\n<\/ul>\n<p>Effectively securing the supply chain from cyber attacks can be difficult because of the ever emerging technologies that are being used throughout and the evolving risks these bring.<\/p>\n<p>However, with careful continued self-auditing and the right systems these risks can be mitigated and ultimately solved.<\/p>\n<h2>JPAero and the Cyber Security<\/h2>\n<p>We are very proud to have achieved our Cyber Certification.<\/p>\n<p>Our cyber certification is part of the Government&#8217;s Cyber Essentials scheme which is a set of technical controls which an organisation should put in place to protect themselves against online security threats.<\/p>\n<p>To have passed we needed to undergo a strict audit across all our cyber security systems.<\/p>\n<p>The Government requires all suppliers bidding for contracts involving the handling of certain sensitive and personal information to be certified against the Cyber Essentials scheme.<\/p>\n<p>Having passed enables us to handle sensitive military parts.<\/p>\n<p>Find out more about the <a href=\"https:\/\/www.gov.uk\/government\/publications\/cyber-essentials-scheme-overview\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Essentials Scheme here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to the military supply chain, data security becomes a matter of national security. So how do we ensure we stay 100% compliant?  <\/p>\n","protected":false},"author":1,"featured_media":937,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber security in the military supply chain | JP Aero<\/title>\n<meta name=\"description\" content=\"When it comes to the military supply chain, data security becomes a matter of national security. So how do we ensure we stay 100% compliant?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber security in the military supply chain | JP Aero\" \/>\n<meta property=\"og:description\" content=\"When it comes to the military supply chain, data security becomes a matter of national security. So how do we ensure we stay 100% compliant?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/\" \/>\n<meta property=\"og:site_name\" content=\"J.P. Aero-Com Limited\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-29T11:03:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-08T13:17:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jpaerocom.co.uk\/news\/wp-content\/uploads\/2019\/08\/curioso-photography-xYrTdhysQY0-unsplash-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"JPAero\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"JPAero\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/\",\"url\":\"https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/\",\"name\":\"Cyber security in the military supply chain | JP Aero\",\"isPartOf\":{\"@id\":\"https:\/\/jpaerocom.co.uk\/news\/#website\"},\"datePublished\":\"2019-08-29T11:03:58+00:00\",\"dateModified\":\"2022-04-08T13:17:49+00:00\",\"author\":{\"@id\":\"https:\/\/jpaerocom.co.uk\/news\/#\/schema\/person\/2aa994c6666f86255206b3e637fd67e1\"},\"description\":\"When it comes to the military supply chain, data security becomes a matter of national security. So how do we ensure we stay 100% compliant?\",\"breadcrumb\":{\"@id\":\"https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jpaerocom.co.uk\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber security in the military supply chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jpaerocom.co.uk\/news\/#website\",\"url\":\"https:\/\/jpaerocom.co.uk\/news\/\",\"name\":\"J.P. Aero-Com Limited\",\"description\":\"Mission Critical Fasteners\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jpaerocom.co.uk\/news\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/jpaerocom.co.uk\/news\/#\/schema\/person\/2aa994c6666f86255206b3e637fd67e1\",\"name\":\"JPAero\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/jpaerocom.co.uk\/news\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/38d18147f7e8c403102255cce09201ba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/38d18147f7e8c403102255cce09201ba?s=96&d=mm&r=g\",\"caption\":\"JPAero\"},\"url\":\"https:\/\/jpaerocom.co.uk\/news\/author\/blaze-dev\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber security in the military supply chain | JP Aero","description":"When it comes to the military supply chain, data security becomes a matter of national security. So how do we ensure we stay 100% compliant?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/","og_locale":"en_GB","og_type":"article","og_title":"Cyber security in the military supply chain | JP Aero","og_description":"When it comes to the military supply chain, data security becomes a matter of national security. So how do we ensure we stay 100% compliant?","og_url":"https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/","og_site_name":"J.P. Aero-Com Limited","article_published_time":"2019-08-29T11:03:58+00:00","article_modified_time":"2022-04-08T13:17:49+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/jpaerocom.co.uk\/news\/wp-content\/uploads\/2019\/08\/curioso-photography-xYrTdhysQY0-unsplash-1.jpg","type":"image\/jpeg"}],"author":"JPAero","twitter_misc":{"Written by":"JPAero","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/","url":"https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/","name":"Cyber security in the military supply chain | JP Aero","isPartOf":{"@id":"https:\/\/jpaerocom.co.uk\/news\/#website"},"datePublished":"2019-08-29T11:03:58+00:00","dateModified":"2022-04-08T13:17:49+00:00","author":{"@id":"https:\/\/jpaerocom.co.uk\/news\/#\/schema\/person\/2aa994c6666f86255206b3e637fd67e1"},"description":"When it comes to the military supply chain, data security becomes a matter of national security. So how do we ensure we stay 100% compliant?","breadcrumb":{"@id":"https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jpaerocom.co.uk\/news\/cyber-security-military-supply-chain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jpaerocom.co.uk\/news\/"},{"@type":"ListItem","position":2,"name":"Cyber security in the military supply chain"}]},{"@type":"WebSite","@id":"https:\/\/jpaerocom.co.uk\/news\/#website","url":"https:\/\/jpaerocom.co.uk\/news\/","name":"J.P. Aero-Com Limited","description":"Mission Critical Fasteners","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jpaerocom.co.uk\/news\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/jpaerocom.co.uk\/news\/#\/schema\/person\/2aa994c6666f86255206b3e637fd67e1","name":"JPAero","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/jpaerocom.co.uk\/news\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/38d18147f7e8c403102255cce09201ba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/38d18147f7e8c403102255cce09201ba?s=96&d=mm&r=g","caption":"JPAero"},"url":"https:\/\/jpaerocom.co.uk\/news\/author\/blaze-dev\/"}]}},"jetpack_featured_media_url":"https:\/\/jpaerocom.co.uk\/news\/wp-content\/uploads\/2019\/08\/curioso-photography-xYrTdhysQY0-unsplash-1.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p5V9kY-a3","_links":{"self":[{"href":"https:\/\/jpaerocom.co.uk\/news\/wp-json\/wp\/v2\/posts\/623"}],"collection":[{"href":"https:\/\/jpaerocom.co.uk\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jpaerocom.co.uk\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jpaerocom.co.uk\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jpaerocom.co.uk\/news\/wp-json\/wp\/v2\/comments?post=623"}],"version-history":[{"count":4,"href":"https:\/\/jpaerocom.co.uk\/news\/wp-json\/wp\/v2\/posts\/623\/revisions"}],"predecessor-version":[{"id":923,"href":"https:\/\/jpaerocom.co.uk\/news\/wp-json\/wp\/v2\/posts\/623\/revisions\/923"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jpaerocom.co.uk\/news\/wp-json\/wp\/v2\/media\/937"}],"wp:attachment":[{"href":"https:\/\/jpaerocom.co.uk\/news\/wp-json\/wp\/v2\/media?parent=623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jpaerocom.co.uk\/news\/wp-json\/wp\/v2\/categories?post=623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jpaerocom.co.uk\/news\/wp-json\/wp\/v2\/tags?post=623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}