1. Cyber-terrorism - the main server of the organisation is taken over by the hackers, asking for huge compensation from the parent organisation to release the server and its contents back to the rightful owner
2. Trojanisation - Trojanisation refers to the intended addition of improper functionality to a software system by a piece of malware - a Trojan Horse. It infects the software downloads with viruses, that could potentially cause server overloads or leak sensitive personal and financial information of employees, organisation and vendors.
3. Advanced Persistent Threat (APT) Definition from whatis.com, "An advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time". The intention of an APT attack is to steal data rather than to cause damage to the network or organization.
5. Outdated security software : Security software needs to be updated as and when patches for new security threats are released.
4. Poor encryption, using 64 bit encryption as compared to 128 or 256 bit encryption which is more secure.
5. Denial of service - Hackers hijacking systems denying the actual users access to the system
1. The smallest vendor may be enabling its employees to access its own mail or operational servers or cloud servers using very weak passwords.
2. The vendor maintaining the website of the small vendor may be careless about his information security systems and employee access.
3. Your supplier's supplier may cause a lapse in the system leading to a whole system compromise
4. Manage system security by adapting security procedures to include suppliers, vendors and even customers