Supply Chain is the network covering materials or services from Vendor, moving/ Transportation , Operations, shipping to customer.

  • You receive an order from your customer
  • Purchase Placed - You put in the order for needed materials or services to your vendor(s)

  • Inbound storage/ Transportation - components arrive at your facility

  • Warehouse - The materials/ components are used to make the finished product

  • Outbound shipping/ Selling-  component ships from your facility to the customer

  • Customer- items arrives to customer > Customer uses product

  • Money is sent to the vendor for materials or services rendered

Three basic things to understand about cyber security



Ransomware is a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledge person to reverse, the more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem - and difficult to trace digital currencies such Ukash and Bitcoin are used for the ransoms, making locating and prosecuting the perpetrators difficult.  

Ransomware attacks are typically carried out using a Trojan that is disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment. However, one high-profile example, the "WannaCry worm," traveled automatically between computers without user interaction.


What We Want To Understand In Order To Help


Who Are The Targets?

  • Every small business, mid-sized company, enterprise, and organization is fair game, especially in light of the recent WannaCry and Petya attacks (though the latter was an atypical ransomware example).
  • The longer answer is more complicated. Your vulnerability to a ransomware attack can depend upon how attractive your data is to criminal hackers, how critical it is that you respond quickly to a ransom demand, how vulnerable your security is, and how vigorously you keep employees trained about phishing emails, among other factors. 

SOP - Standard Operation Procedure

It does matter the size or complexity we all need to understand the critical application and databases required to do business.  Then we understand how they are protected (RPO and RTO).  Leverage Industry Standard and leading Technology to help protect your Business