Plaintext with Rich
Cybersecurity is an everyone problem. So why does it always sound like it’s only for IT people?
Each week, Rich takes one topic, from phishing to ransomware to how your phone actually tracks you, and explains it in plain language in under ten minutes or less. No buzzwords. No condescension. Just the stuff you need to know to stay safer online, explained like you’re a smart person who never had anyone break it down properly. Because you are!
Plaintext with Rich
Supply Chain Cybersecurity: When the Breach Starts Upstream
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
You can lock down every system you own. Patch everything. Train everyone. And still lose control, because the failure didn't start with you. It started somewhere upstream.
This episode breaks down supply chain cybersecurity by explaining why attackers who can't reach you directly look for someone you already trust. It covers the most common patterns: tampered software updates that arrive through legitimate channels, vendor breaches that expose your data through someone else's failure, compromised third-party credentials, and dependency risk hidden inside assembled code libraries. The episode explains why these attacks scale so effectively and why they're hard to defend against, because they ride on legitimate trust. The starter kit covers identifying crown jewel data, mapping real vendor relationships, limiting vendor access aggressively, protecting vendor logins with mandatory MFA, monitoring vendor behavior, patching shared dependencies fast, asking better pre-purchase questions, putting security expectations in contracts, and maintaining backups that actually restore.
Whether you manage vendor relationships, oversee procurement decisions, or just want to understand why one compromised supplier can impact thousands of organizations, Plaintext with Rich explains the risk and the response.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene
Why Doing Everything Right Fails
SPEAKER_00You can lock down every system you own, patch everything, train everyone, and still lose control. Because the failure didn't actually start with you or inside your organization. It started somewhere else upstream. Welcome to plain text with rich. Today we're talking about supply chain cybersecurity. Now, let's start by translating the phrase because supply chain sounds abstract for a lot of people until it suddenly isn't. And in plain text, your supply chain is everything you rely on that you didn't build yourself. Think about this software you install, cloud services you log into, vendors that store your data, IT providers with access, contractors, open source code inside your applications, sometimes even hardware and firmware. If it helps you operate and someone else controls part of that, it's in your supply chain. Supply chain cybersecurity is about one uncomfortable reality. If attackers can't get to you directly, they look for someone you already trust. Again, not because you're careless, because trust is efficient and attackers, well, they like efficiency. So what does a supply chain attack actually look like in the real world? There are a few repeat patterns that would show up. One is tampered updates. You install software from a legitimate vendor, the update looks real because it is real, but something upstream was compromised before it reached you. Now, no alarms, no obvious warning. You let the attackers in yourself because the process told you it was safe. Another pattern is vendor breaches. Again, your organization isn't hacked directly, but your vendor is. Your data lives in their systems. Their security failure becomes your incident. Another pattern would be third-party access. Think about a contractor or service provider that has a login to your environment. They get phished, their account becomes the attacker's account. And of course, there's always going to be dependency risk, right? Modern software isn't written from scratch, it's assembled from libraries, packages, plugins. If one of those components is malicious, outdated, or impersonated, your application inherits the risk automatically. And when we look at all these, there's a common thread. Supply chain attacks scale. Compromise one supplier, impact hundreds or thousands of downstream customers. That's why attackers are starting to love them. So when we think about this, why are these attacks so difficult to fend against? It's because they ride on legitimate trust. Most security advice sounds like don't click weird links, don't open suspicious files. Supply chain attacks don't look suspicious. They look like your update system, your vendor portal, your IT provider, your normal workflow. Again, the attacker isn't breaking in, they're arriving through a door that you already use. That doesn't mean trust is bad. It means unbounded trust is fragile. Good security doesn't eliminate trust. Remember, it limits how much damage trust can cause when it fails. So if we got practical for this, right, our plaintext supply chain starter kit, again, high leverage, low drama. We have four things you can look at here. Step one, identify what actually matters, right? What data or systems would hurt most to lose? Customer information, financial records, employee data, source code, production environments, right? If you can't name your crown jewels, everything feels equally urgent and nothing gets protected well. Then we want to map your real vendors, right? Not a massive spreadsheet. Just answer this question: who has your data, your logins, or access to your systems? That shortlist is your supply chain risk surface. In step three, we'd want to limit vendor access aggressively. Again, lease privilege isn't optional here, and lease privilege is one of my favorite things in the entire world. If a vendor needs access to one tool, give them one tool. If they need access temporarily, make it temporary. If they don't need admin, don't give admin. Convenience expands the blast radius. Boundaries are going to contain it. Step four, protect your vendor logins like production keys. Mandatory multi-factor authentication, no exceptions. If a vendor account can touch production, it deserves stronger protection than a normal user account. And because we'd like to add a little bit more, if you can do more, maybe look at these. Step five, monitor vendor behavior. Again, you don't need paranoia, you just need visibility. Things like new locations, unusual downloads, permission changes, right? Security controls being disabled. You're not watching people, you're watching systems behave oddly. Step six, patch shared dependencies fast. When a widely used vendor or library issues a critical fix, any kind of delay is going to compound that risk, right? Shared components mean shared urgency. For step seven, ask better questions before you buy, you know, not security theater, just plain text questions. Do you use MFA? How fast do you patch critical issues? How do you notify customers after incidents? Can access be limited by role? Do you support SSO? Again, these aren't gotcha questions. They're more responsibility questions. Step eight, put security expectations in writing. Contracts matter, breach notification timeline, security requirements, clear ownership. Again, I mentioned it a lot already in plenty of different episodes. Hope is not a control. Put it in writing and let it rip. Step nine, backups and recovery. Because hey, sometimes everything else still fails, no matter how good we're trying to do. Good backups turn disasters into the slight interruptions. And backups again only count if you can restore them. So make sure that if we are making backups, we are testing backups. So a quick reality check before we wrap up. Supply chain security isn't just for massive enterprises. Smaller organizations are affected constantly because they also rely on those same tools, if not more of them, because they are a smaller organization that can't build their own things. Trusted vendors are not safer by default. They're higher value targets. And you are not powerless here. You may not control vendor security, but you do control access, monitoring, and recovery. And that's where resilience lives. Supply chain cybersecurity is about managing the risk introduced by the tools and partners you rely on, not eliminating trust, right? Designing for when that trust breaks. If you take four actions this week when it comes to this, hey, again, list the vendors that touch your systems or data, enforce MFA on every vendor account, limit vendor agency or access aggressively, verify your backups, actually restore. That's real progress. As always, if there's a security topic you want broken down in plain text, send it my way, email, DM, drop it in the comments. However, you reach me, I will read it, I will reply. If this episode helped, share it with someone who'd actually benefit. That'd be amazing. This has been plain text with rich. 10 minutes or less, one topic, no panic. I'll see you next time.