• Contact
  • Privacy Policy
  • Advertise With Us
  • Login
  • Register
Your Trading Edge Magazine
  • Home
  • Feature
    • Market Commentary
    • Expert Advice
    • Columns
  • Trading
    • Shares and Trading
    • Technical Analysis
    • Trading Mindset
  • Crypto News
  • Finance
  • Subscribe
No Result
View All Result
  • Home
  • Feature
    • Market Commentary
    • Expert Advice
    • Columns
  • Trading
    • Shares and Trading
    • Technical Analysis
    • Trading Mindset
  • Crypto News
  • Finance
  • Subscribe
No Result
View All Result
Your Trading Edge Magazine
No Result
View All Result

Security and EDI, the Trojan Horses of Cyber Attackers

October 19, 2021
in Trading
Reading Time: 3 mins read
A A
0
Security and EDI, the Trojan Horses of Cyber Attackers
0
SHARES
5
VIEWS
ShareShareShareShareShare

If no one is safe from a cyber-attack, then the multiplication of EDI flow increases the vulnerability of a company. Indeed, EDI flows with less protected subcontractors can be privileged entry points for attackers. The choice of a reliable and certified EDI provider is becoming more and more necessary. 

SMEs, the weakest link in cybersecurity

When it comes to cybersecurity, small businesses are the weakest link and the ones that attackers are targeting, so that they reach larger targets. Faced with this phenomenon, some companies use rating companies to estimate the security level of their suppliers and eventually select them according to their score. This approach is extremely costly and is nevertheless reserved for a few large international companies.

A study conducted by cybersecurity firm BlueVoyant shows that of the 1,500 companies surveyed, 77% of CISOs and CIOs report a complete lack of visibility into their vendors’ security. At the same time, 82% have experienced at least one data breach in the past 12 months. This lack of control over third-party security can be explained by the fact that a company’s cyber resources are obviously focused on securing their own information systems. Some companies send a security questionnaire to their partners to assess their practices, but the average company has about 1000 partners, which limits the company’s ability to control them. Cyber threats and protection systems are constantly evolving, and even systems that may appear to be the most mature, such as EDI (Electronic Data Interchange), are not always the most secure.

EDI, a secure technology, but not safe from attackers

By design, EDI flows are secure: the protocol ensures the integrity and traceability of exchanges. The data itself is encrypted, which guarantees its confidentiality and integrity, but EDI flows can potentially be exploited by hackers to infiltrate the information system of a company or its EDI provider, or to divert data indirectly.

Since the 2010s, EDI network flows initially carried by the specialized X25 network have given way to IP and Internet connections. In the same way, the use of EDI has expanded, especially among SMEs, thanks to the development of Web-EDI type solutions, accessible to all. Any company can communicate EDI data via a simple Web browser and this democratization increases the risk of computer hacking.

The ecosystem, a concept too often underestimated by companies

For example, a supplier who links his computer to a client, so he can obtain a list of addresses, will open a connection between the two platforms. By attacking the supplier, the cyber attacker opens a breach towards the client’s company.

While it is appropriate for the supplier to protect its customers, it is also up to the client to qualify the trust it places in the supplier. Intrusion attempts are polymorphous: if identity theft is the most frequent case, companies must generally limit the flow of sensitive data communicated within their ecosystem.

The support of all EDI formats and protocols on the market is the first criterion for choosing an EDI solution. The platform must support EANCOM, EDIFACT, XML, UBL, HL7, JSON, PDF or X12, but also offer interfaces with ERP and business software packages such as SAP, Microsoft, Oracle or Sage. Finally, the EDI provider must obviously have interoperability capabilities with all the countries with which the company will have to exchange. But nowadays, you must also choose your EDI provider according to its maturity and its investments in cybersecurity.

The role of the EDI provider has evolved; it has become a key player in protecting companies from these attacks and the company itself must ensure the seriousness of the protections put in place by its EDI provider before connecting to its service.

Certifications and standards are a way to ensure the seriousness of its processes. An ISO 27001 certification appears as an essential criterion in the selection of an EDI provider. It is up to the provider to ensure that the data flow is not subject to a “Man in the Middle” attack. It is also the provider who stores the data exchanged between EDI partners. This storage must therefore be encrypted to ensure that, even if an attacker manages to penetrate the defenses in place, he cannot exploit the data exposed to his attack. Asymmetric encryption is the most secure solution to protect data, but some players are now turning to Blockchain technology to further increase the security level of their EDI.

Generix Group North America provides a series of solutions within our Supply Chain Hub product suite to create efficiencies across an entire supply chain. Our solutions are in use around the world and our experience is second-to-none. We invite you to contact us to learn more.

Credit: Source link

ShareTweetSendPinShare
Previous Post

World Potato Trade Slips Under $5B

Next Post

What Fleet Managers Should Know About DOT Inspections

Related Posts

Strategic Cost Management Helps Energy Companies Uncover Supply Chain Inefficiencies
Trading

Plans For a Minimum Tax On Profits Of Multinationals- Global Trade Mag

June 26, 2022
4
Wiliot Revolutionizes Cold Chain Operations
Trading

Wiliot Revolutionizes Cold Chain Operations

June 25, 2022
8
How Virtual Credit Cards Are Powering New Digital Business Models
Trading

How Virtual Credit Cards Are Powering New Digital Business Models

June 24, 2022
6
SEKO Logistics Taps MyFBAPrep to be Preferred Amazon FBA Partner
Trading

SEKO Logistics Taps MyFBAPrep to be Preferred Amazon FBA Partner

June 24, 2022
4
Managing Organization Device Fleet with IoT Device
Trading

Managing Organization Device Fleet with IoT Device

June 24, 2022
6
Next Post
What Fleet Managers Should Know About DOT Inspections

What Fleet Managers Should Know About DOT Inspections

Recommended

Shiba Inu (SHIB) Surges Above $0.0000115, Up Over 40% This Week

Shiba Inu (SHIB) Surges Above $0.0000115, Up Over 40% This Week

June 25, 2022
8
XRP price surges 14%

XRP price surges 14%

June 24, 2022
5
DOCSIS Technology Market Size, Share & Growth | Forecast [2029] | Market Demand, Key Players, New Developments, Price, Revenue & Gross Margin, Market Drivers, Opportunities, Challenges and Risks Factors Analysis

DOCSIS Technology Market Size, Share & Growth | Forecast [2029] | Market Demand, Key Players, New Developments, Price, Revenue & Gross Margin, Market Drivers, Opportunities, Challenges and Risks Factors Analysis

May 29, 2022
5
The bear market could last through 2022

The bear market could last through 2022

June 10, 2022
1
ASCM’s 2022 Salary and Career Report Shows Minimal Impact from the Great Resignation, High Job Satisfaction 

TRADE X Opens New Office in Lagos, Nigeria to Accommodate Growing Automotive Demand in Africa’s Largest Economy

June 13, 2022
6
Your Trading Edge Magazine

This is an online news portal that aims to share the latest news about trade, finance, crypto and much more. Feel free to get in touch with us!

What’s New Here!

  • These Are the Two Challenges for XRP Following 30% Recovery in 9 Days (Ripple Price Analysis)
  • Stocks pace towards worst start since 1970
  • U.S. families face ‘exponential increase’ in child care costs: Care.com CEO

Subscribe Now

Loading
  • Contact
  • Privacy Policy
  • Advertise With Us

© 2021 - ytemagazine.com - All rights reserved!

No Result
View All Result
  • Home
  • Feature
    • Market Commentary
    • Expert Advice
    • Columns
  • Trading
    • Shares and Trading
    • Technical Analysis
    • Trading Mindset
  • Crypto News
  • Finance
  • Subscribe

© 2021 - ytemagazine.com - All rights reserved!

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?