BusinessCybersecurityNewswireTechnology

How Supply Chain Sprawl Is Reshaping Security

Originally published on: November 26, 2025
▼ Summary

– Supply chain cybersecurity risks are a top concern for organizations, with 70% of professionals worried about third-party vendor risks, especially in enterprise and sensitive data sectors.
– Organizations that have experienced vendor-related security incidents show higher concern, with nearly one-third reporting such incidents in the past two years.
– Lack of visibility into vendor and subcontractor security controls is the biggest challenge, leading to reliance on outdated or unverified information.
– Data breaches are the most disruptive supply chain threat, followed by malware and ransomware, with attackers targeting weaker vendor defenses to bypass stronger customer security.
– Organizations use risk assessments and control requirements like ISO 27001 for vendor management, but oversight varies widely and often lacks ongoing monitoring, leaving gaps in security posture.

Businesses today operate within a complex web of third-party suppliers, creating a supply chain sprawl that introduces significant cybersecurity vulnerabilities. A recent survey of over one thousand cybersecurity professionals reveals that risks stemming from vendor relationships are a primary concern, especially for large enterprises and sectors managing sensitive financial or government data.

Seventy percent of those surveyed expressed worry about cybersecurity threats linked to their suppliers. This concern intensifies among organizations that have already faced a vendor-related security incident, with nearly one-third reporting such an event in the last two years. Larger companies and financial service providers show the highest levels of apprehension.

As organizations adopt more tools and services, their vendor networks continue to expand. Each new integration increases potential exposure, yet many security teams find it difficult to map the full depth of these interconnected systems. The lack of visibility into subcontractors and their security measures remains the most frequently cited challenge. Several professionals admitted they operate on trust rather than verified data because vendors often provide limited insight into their actual practices.

Some suppliers share security information only during the initial onboarding process. If this information isn’t regularly updated, clients may base their risk assessments on outdated assumptions, missing important changes in the vendor’s security posture.

When it comes to specific threats, data breaches lead the list, identified by 64% of respondents as the most disruptive supply chain risk. Malware, ransomware, and software vulnerabilities in supplier systems also ranked high. Additional worries include unauthorized access through third-party credentials, insufficient visibility into vendor security controls, and insider threats within supplier organizations. These patterns indicate that attackers frequently target weaker links in vendor networks to bypass the stronger defenses of their primary targets.

In response, organizations are implementing various strategies to manage these risks. Many rely on risk assessments and supplier reviews to gain basic visibility into security practices. These evaluations typically occur during vendor onboarding and at scheduled intervals, helping teams verify that required security controls remain active.

However, the frequency of these reviews varies significantly. Some organizations assess their suppliers only at the start of the relationship, potentially leaving security gaps unaddressed for years. This approach means customers might depend on obsolete information, unaware of deteriorations in a vendor’s security stance.

Procurement teams often establish specific control requirements for vendors. Compliance with standards like ISO 27001, SOC 2, and NIST frameworks represents the most common prerequisite. Other frequent demands include security audits, attestations, multi-factor authentication, secure access protocols, and defined incident reporting procedures. Only a small fraction of organizations reported having no control requirements for their suppliers.

Setting controls at the beginning of a vendor relationship is important, but it doesn’t replace the need for continuous oversight. Organizations display wide variation in how they handle ongoing risk management. Some maintain formal programs that guide regular assessments and decision-making. Others depend on contractual terms or address risks reactively. A number are still in the process of developing defined procedures, highlighting the uneven maturity of supply chain risk management across different industries.

Most respondents working for supplier organizations indicated their companies have incident response plans and communication procedures aligned with established standards and regulations. Still, not every vendor maintains a documented process, and some employees are uncertain whether such plans exist. This ambiguity creates uncertainty for clients who rely on prompt and accurate communication during security incidents.

(Source: HelpNet Security)

Topics

supply chain risk 95% visibility challenges 90% Risk Management 85% vendor ecosystems 85% security incidents 80% risk assessments 80% data breaches 75% compliance requirements 75% software vulnerabilities 75% ransomware attacks 70%