{"id":3210,"date":"2021-05-28T11:15:27","date_gmt":"2021-05-28T11:15:27","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=3210"},"modified":"2021-05-26T11:16:32","modified_gmt":"2021-05-26T11:16:32","slug":"minimizing-the-risk-of-supply-chain-attacks","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2021\/05\/resources\/minimizing-the-risk-of-supply-chain-attacks\/","title":{"rendered":"Minimizing the Risk of Supply Chain Attacks"},"content":{"rendered":"<p>The\u00a0<a href=\"https:\/\/news.sophos.com\/en-us\/tag\/solarwinds\/\">recent cyberattack<\/a>\u00a0on IT-monitoring company SolarWinds pushed supply chain weaknesses into the spotlight by highlighting just how unprepared many organizations are when it comes to defending against supply chain attacks.<\/p>\n<p>These attacks often happen because they don\u2019t know where to start or don\u2019t believe themselves important or high-profile enough to be targeted.<\/p>\n<p>In our new report,\u00a0<a href=\"https:\/\/www.sophos.com\/en-us\/security-news-trends\/whitepapers\/gated-wp\/supply-chain-attacks-best-practice.aspx\" target=\"_blank\" rel=\"noopener\">Minimizing the Risk of Supply Chain Attacks<\/a>, we clear up the confusion around these attacks. The report covers how supply chain attacks work, best practices to defend against them, and the role of technology and services in minimizing the impact of such attacks. Read more about best practices guidelines on our <a href=\"https:\/\/news.sophos.com\/en-us\/2021\/04\/28\/minimizing-the-risk-of-supply-chain-attacks-best-practice-guidelines\/\">Sophos News blog<\/a>.<\/p>\n<p><strong>Educate customers and prospects and generate demand for your business<\/strong><\/p>\n<p>Make the most of Sophos partner marketing resources to run a successful partner marketing campaign, educate your audiences, and generate demand for your business. The ready-to-run campaign kit includes the pdf report, a complete PowerPoint deck, and co-brandable email templates.<\/p>\n<p><a href=\"https:\/\/partners.sophos.com\/prm\/English\/c\/supply-chain-attack-campaign\">Access partner marketing campaign assets<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Share practical cybersecurity guidance with your customers and prospects to prevent supply chain attacks.<\/p>\n","protected":false},"author":32,"featured_media":345,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[12,139,21],"coauthors":[84],"class_list":["post-3210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-resources","tag-campaigns","tag-marketing","tag-threats-malware"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2019\/11\/featured-image-co-marketing.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=3210"}],"version-history":[{"count":2,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3210\/revisions"}],"predecessor-version":[{"id":3213,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3210\/revisions\/3213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media\/345"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=3210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=3210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=3210"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=3210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}