{"id":3274,"date":"2025-10-20T18:29:37","date_gmt":"2025-10-20T16:29:37","guid":{"rendered":"https:\/\/tenglerconsulting.com\/?p=3274"},"modified":"2026-02-06T09:27:03","modified_gmt":"2026-02-06T08:27:03","slug":"cybercrime-in-the-supply-chain-what-companies-need-to-know-now","status":"publish","type":"post","link":"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/","title":{"rendered":"Cybercrime in the supply chain \u2013 What companies need to know now"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row section_type=&#8221;fullwidth&#8221; height_ratio=&#8221;60&#8243; padding_top_multiplier=&#8221;&#8221; padding_bottom_multiplier=&#8221;&#8221; rc_bg_type=&#8221;image&#8221; rc_bg_image=&#8221;3278&#8243; columns_gap=&#8221;none&#8221;][vc_column][\/vc_column][\/vc_row][vc_row section_type=&#8221;fullwidth&#8221; padding_top_multiplier=&#8221;3x&#8221; padding_bottom_multiplier=&#8221;4x&#8221; columns_gap=&#8221;60&#8243;][vc_column width=&#8221;2\/3&#8243;]<h1 class=\"grve-element grve-title grve-align-inherit grve-h2\"><span>Cybercrime in the supply chain \u2013 What companies need to know now<\/span><\/h1><div class=\"grve-empty-space grve-height-1x\"><\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row][vc_row section_type=&#8221;fullwidth&#8221; padding_top_multiplier=&#8221;&#8221; padding_bottom_multiplier=&#8221;&#8221; columns_gap=&#8221;60&#8243;][vc_column]<div class=\"grve-element grve-divider\"><span class=\"grve-custom-divider grve-bg-dark-grey grve-align-inherit\" style=\"width: 100%;height: 1px;\"><\/span><\/div>[\/vc_column][\/vc_row][vc_row section_type=&#8221;fullwidth&#8221; padding_top_multiplier=&#8221;3x&#8221; padding_bottom_multiplier=&#8221;2x&#8221; columns_gap=&#8221;60&#8243;][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221; text_style=&#8221;small-text&#8221;]<span style=\"color: #58a4b0;\">01<\/span>[\/vc_column_text]<h3 class=\"grve-element grve-title grve-align-inherit grve-h6\"><span>Cybercrime has long been a supply chain issue<\/span><\/h3>[\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]Cyberattacks no longer only affect the IT department. They directly interfere with operational processes and jeopardize the stability of entire supply chains. With increasing digital networking, close integration of external partners, and global networks, the attack surface is growing. A single hacker attack can paralyze production planning, delay deliveries, and cause lasting damage to customer relationships.<br \/>\nThe message is clear: cybersecurity has long been a decisive competitive factor in the supply chain.[\/vc_column_text][\/vc_column][\/vc_row][vc_row section_type=&#8221;fullwidth&#8221; padding_bottom_multiplier=&#8221;2x&#8221; columns_gap=&#8221;60&#8243;][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221; text_style=&#8221;small-text&#8221;]<span style=\"color: #58a4b0;\">02<\/span>[\/vc_column_text]<h3 class=\"grve-element grve-title grve-align-inherit grve-h6\"><span>Threat situation<\/span><\/h3>[\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]The figures speak for themselves: Between 2021 and 2023, supply chain attacks more than quadrupled.[1] Industry is particularly affected, as its closely interlinked value creation networks are an ideal target for cybercriminals.<\/p>\n<p>New legal requirements such as the EU <strong>NIS2<\/strong> Directive further tighten the requirements: In the future, companies will also be liable for cyber vulnerabilities of their suppliers.[2]<\/p>\n<p>The scale of the threat can be summarized in three key figures:<\/p>\n<ul>\n<li><strong>+300%<\/strong> supply chain attacks in just three years [1]<\/li>\n<li><strong>&gt;80%<\/strong> of companies have already been affected by third parties [3]<\/li>\n<li>Only <strong>25%<\/strong> systematically assess risks in their supply chain [4]<\/li>\n<\/ul>\n<p>This makes it clear that cybercrime has long been a widespread risk that many companies still underestimate.[\/vc_column_text][\/vc_column][\/vc_row][vc_row section_type=&#8221;fullwidth&#8221; padding_bottom_multiplier=&#8221;2x&#8221; columns_gap=&#8221;60&#8243;][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221; text_style=&#8221;small-text&#8221;]<span style=\"color: #58a4b0;\">03<\/span>[\/vc_column_text]<h3 class=\"grve-element grve-title grve-align-inherit grve-h6\"><span>Real-world examples<\/span><\/h3>[\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]Two prominent cases show that cyberattacks have real and massive consequences:<\/p>\n<ul>\n<li>Maersk (2017): A ransomware attack paralyzed global logistics for weeks. The damage: over $200 million.[5]<\/li>\n<li>Colonial Pipeline (2021): A cyberattack caused fuel shortages in the US, resulting in panic buying at gas stations.[6]<\/li>\n<\/ul>\n<p>These examples make it clear that cybercrime is not an isolated IT problem, but strikes at the heart of the supply chain. When logistics networks come to a halt or critical infrastructure such as energy supplies fail, production plans are disrupted, material flows are interrupted, and entire value chains grind to a halt. This makes it clear that cyberattacks not only endanger data, but also directly threaten the delivery capabilities and production security of companies.[\/vc_column_text][\/vc_column][\/vc_row][vc_row section_type=&#8221;fullwidth&#8221; padding_bottom_multiplier=&#8221;2x&#8221; columns_gap=&#8221;60&#8243;][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221; text_style=&#8221;small-text&#8221;]<span style=\"color: #58a4b0;\">04<\/span>[\/vc_column_text]<h3 class=\"grve-element grve-title grve-align-inherit grve-h6\"><span>What this has to do with supply chain strategy<\/span><\/h3>[\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]The key question is: How can cyber risks be actively integrated into supply chain strategy? Three levers are crucial:<\/p>\n<p><strong><a href=\"https:\/\/tenglerconsulting.com\/en\/value-chain-optimization\/integrated-business-planning\/\">One plan<\/a><br \/>\n<\/strong>When cyber risks are included in integrated planning from the outset, companies can respond more quickly and in a more targeted manner. Scenarios can be systematically played out, such as the question of how the supply chain remains stable if a transport service provider fails due to a cyberattack.<\/p>\n<p><strong><a href=\"https:\/\/tenglerconsulting.com\/en\/value-chain-optimization\/supply-chain-segmentation\/\">Segmentation<\/a><br \/>\n<\/strong>Since not all suppliers are equally important or equally risky, companies should evaluate their partners in a differentiated manner. Critical suppliers must be prioritized so that targeted security measures can be implemented, and resources can be used efficiently.<\/p>\n<p><strong><a href=\"https:\/\/tenglerconsulting.com\/en\/value-chain-optimization\/working-capital-optimization\/\">Inventory &amp; Network<\/a><br \/>\n<\/strong>Companies should consciously secure critical inventories to avoid supply gaps in an emergency. Network simulations help to place these inventories optimally. At the same time, it is crucial to regularly review the network structure: unilateral dependencies such as single sourcing increase risk, while alternatives such as dual sourcing or nearshoring strengthen resilience.[\/vc_column_text][\/vc_column][\/vc_row][vc_row section_type=&#8221;fullwidth&#8221; padding_bottom_multiplier=&#8221;2x&#8221; columns_gap=&#8221;60&#8243;][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221; text_style=&#8221;small-text&#8221;]<span style=\"color: #58a4b0;\">05<\/span>[\/vc_column_text]<h3 class=\"grve-element grve-title grve-align-inherit grve-h6\"><span>Recommended actions<\/span><\/h3>[\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]The following steps are key to systematically strengthening cyber resilience in the supply chain:<\/p>\n<ul>\n<li><strong>Regularly and automatically check third parties<\/strong><\/li>\n<li><strong>Segment and classify supplier risks<\/strong><\/li>\n<li><strong>Integrate cyber risks into the One Plan<\/strong><\/li>\n<li><strong>Maintain targeted security buffers for critical parts<\/strong><\/li>\n<li><strong>Review governance structures (clear roles, responsibilities, escalation paths)<\/strong><\/li>\n<li><strong>Sensitize and train employees \u2013 awareness is a key component<\/strong><\/li>\n<li><strong>Use secure communication platforms instead of unprotected emails<\/strong><\/li>\n<\/ul>\n<p>In addition, cybercrime risks should be measured regularly in the <strong>Sales and Operations Planning<\/strong> (S&amp;OP) process and reviewed as a KPI. This transforms cybersecurity from an IT problem into an integral part of supply chain management.[\/vc_column_text][\/vc_column][\/vc_row][vc_row section_type=&#8221;fullwidth&#8221; columns_gap=&#8221;60&#8243;][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;]<div class=\"grve-element grve-image grve-align-left\">\r\n\t<div class=\"grve-image-item\">\r\n\t\t\r\n\r\n<div class=\"grve-image-wrapper grve-no-effect\">\r\n\t\t<div class=\"grve-thumbnail-wrapper\"  style=\"width: 3733px;\"><div class=\"grve-thumbnail\"  style=\"padding-top: 42.968%;\"><img loading=\"lazy\" decoding=\"async\" width=\"3733\" height=\"1604\" src=\"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2025\/10\/Pyramide-EN.svg\" class=\"attachment-impeka-grve-small-square size-impeka-grve-small-square\" alt=\"\" data-column-space=\"auto\" data-lazyload=\"\" data-grve-filter=\"yes\" \/><\/div><\/div>\t<\/div>\r\n\t<\/div>\r\n<\/div>\r\n<div class=\"grve-empty-space grve-height-1x\"><\/div>[vc_column_text css=&#8221;&#8221; text_style=&#8221;small-text&#8221;]Figure 1: <span data-olk-copy-source=\"MessageBody\">Recommendations on strategic, tactical and operational level (of the supply chain)<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row section_type=&#8221;fullwidth&#8221; padding_bottom_multiplier=&#8221;2x&#8221; columns_gap=&#8221;60&#8243;][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221; text_style=&#8221;small-text&#8221;]<span style=\"color: #58a4b0;\">06<\/span>[\/vc_column_text]<h3 class=\"grve-element grve-title grve-align-inherit grve-h6\"><span><span lang=\"EN-US\">Conclusion<\/span><\/span><\/h3>[\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]Cybercrime is a strategic supply chain risk with real economic consequences. Companies that manage to <strong>embed cyber resilience as part of their supply chain strategy<\/strong> not only secure their data, but also their delivery capabilities and reputation.<\/p>\n<p>The consulting approach is clear<strong>: integrate, prioritize, secure \u2013 instead of just reacting<\/strong>.<\/p>\n<p>Companies that establish cyber risks as an integral part of their supply chain planning not only gain security, but also a decisive competitive advantage.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Sources:<br \/>\n<\/strong>[1] Cyberint, 2024: <a href=\"https:\/\/cyberint.com\/blog\/research\/recent-supply-chain-attacks-examined\/\">The Weak Link: Recent Supply Chain Attacks Examined<\/a> [Accessed: 28 September 2025].<br \/>\n[2] Die Presse, 2025: <a href=\"https:\/\/www.diepresse.com\/19383684\/haftung-fuer-cyberrisiken\">Haftung f\u00fcr Cyberrisiken<\/a> [Accessed: 28 September 2025].<br \/>\n[3] BlueVoyant, 2024: <a href=\"https:\/\/www.bluevoyant.com\/press-releases\/progress-in-third-party-cyber-risk-management?page=1\">New Report from BlueVoyant Shows Progress in Third-Party Cyber Risk Management, But Breaches Persist<\/a> [Accessed: 28 September 2025].<br \/>\n[4] Next Education Group, 2024: <a href=\"https:\/\/nexteducationgroup.com\/articles\/has-the-focus-on-supply-chain-resilience-waned\/?utm\">Has the Focus on Supply Chain Resilience Waned?<\/a> [Accessed: 28 September 2025].<br \/>\n[5] Wired, 2018: <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\">The Untold Story of NotPetya, the Most Devastating Cyberattack in History ?<\/a> [Accessed: 28 September 2025].<br \/>\n[6] Forbes, 2021: <a href=\"https:\/\/www.forbes.com\/sites\/nicholasreimann\/2021\/05\/12\/colonial-pipeline-restarts-operations-after-hack-but-fuel-shortages-to-linger\/\">Colonial Pipeline Restarts Operations After Hack, But Fuel Shortages Will Linger<\/a> [Accessed: 28 September 2025].<strong><br \/>\n<\/strong>[\/vc_column_text][\/vc_column][\/vc_row][vc_row section_type=&#8221;fullwidth&#8221; padding_bottom_multiplier=&#8221;2x&#8221; columns_gap=&#8221;60&#8243;][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221; text_style=&#8221;small-text&#8221;]<span style=\"color: #58a4b0;\">07<\/span>[\/vc_column_text]<h3 class=\"grve-element grve-title grve-align-inherit grve-h6\"><span><span lang=\"EN-US\">Further insights<\/span><\/span><\/h3>[\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]For more information on optimizing your supply chain planning, please take a look at our <a href=\"https:\/\/tenglerconsulting.com\/en\/supply-chain-insights\/\">Insights<\/a>.[\/vc_column_text][\/vc_column][\/vc_row][vc_section disable_element=&#8221;yes&#8221; el_id=&#8221;author&#8221;][vc_row section_type=&#8221;fullwidth&#8221; padding_top_multiplier=&#8221;&#8221; padding_bottom_multiplier=&#8221;&#8221; columns_gap=&#8221;60&#8243;][vc_column]<div class=\"grve-element grve-divider\"><span class=\"grve-custom-divider grve-bg-dark-grey grve-align-inherit\" style=\"width: 100%;height: 1px;\"><\/span><\/div>[\/vc_column][\/vc_row][vc_row section_type=&#8221;fullwidth&#8221; padding_top_multiplier=&#8221;3x&#8221; padding_bottom_multiplier=&#8221;3x&#8221; columns_gap=&#8221;60&#8243; equal_column_height=&#8221;equal&#8221;][vc_column width=&#8221;1\/3&#8243; full_height=&#8221;yes&#8221;]<div class=\"grve-element grve-image grve-align-center\">\r\n\t<div class=\"grve-image-item\">\r\n\t\t\r\n\r\n<div class=\"grve-image-wrapper grve-no-effect\">\r\n\t\t<div class=\"grve-thumbnail-wrapper\"  style=\"width: 1536px;\"><div class=\"grve-thumbnail\"  style=\"padding-top: 125%;\"><img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"1920\" src=\"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2024\/08\/TC3.jpg\" class=\"attachment-full size-full\" alt=\"\" data-column-space=\"auto\" data-lazyload=\"\" data-grve-filter=\"yes\" srcset=\"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2024\/08\/TC3.jpg 1536w, https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2024\/08\/TC3-240x300.jpg 240w, https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2024\/08\/TC3-819x1024.jpg 819w, https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2024\/08\/TC3-768x960.jpg 768w, https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2024\/08\/TC3-1229x1536.jpg 1229w\" sizes=\"auto, (max-width: 1536px) 100vw, 1536px\" \/><\/div><\/div>\t<\/div>\r\n\t<\/div>\r\n<\/div>\r\n[\/vc_column][vc_column width=&#8221;2\/3&#8243; full_height=&#8221;yes&#8221;][vc_row_inner height_ratio=&#8221;50&#8243;][vc_column_inner full_height=&#8221;yes&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;special-link&#8221;]<strong>Ready to strengthen your supply chain\u2019s sustainability through a stronger integration?<\/strong> Contact us at <a href=\"mailto:office@tenglerconsulting.com\">office@tenglerconsulting.com<\/a> to discuss how we can develop a planning framework\u2014supporting sustainable, efficient, and resilient supply chain practices made to your business needs.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner height_ratio=&#8221;50&#8243;][vc_column_inner vertical_content_position=&#8221;bottom&#8221; full_height=&#8221;yes&#8221;][vc_column_text css=&#8221;&#8221; text_style=&#8221;small-text&#8221;]<strong>About the author<\/strong>[\/vc_column_text]<div style=\"height: 14px;\" class=\"grve-empty-space\"><\/div><h3 class=\"grve-element grve-title grve-align-inherit grve-h3\" style=\"margin-bottom: 5px;\"><span>Daria Reshetniak<\/span><\/h3>[vc_column_text css=&#8221;&#8221;]T: +43 1 234 56 78<br \/>\nE: <a href=\"mailto:daria.reshetniak@tenglerconsulting.com\">daria.reshetniak@tenglerconsulting.com<\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section][vc_section el_id=&#8221;contact&#8221;][vc_row section_type=&#8221;fullwidth&#8221; padding_top_multiplier=&#8221;&#8221; padding_bottom_multiplier=&#8221;&#8221; columns_gap=&#8221;60&#8243;][vc_column]<div class=\"grve-element grve-divider\"><span class=\"grve-custom-divider grve-bg-dark-grey grve-align-inherit\" style=\"width: 100%;height: 1px;\"><\/span><\/div>[\/vc_column][\/vc_row][vc_row section_type=&#8221;fullwidth&#8221; padding_top_multiplier=&#8221;3x&#8221; columns_gap=&#8221;60&#8243;][vc_column width=&#8221;3\/4&#8243;]<h3 class=\"grve-element grve-title grve-align-inherit grve-h3\"><span>Check now how well your supply chain is protected against cyberattacks\u2014and make cyber resilience an integral part of your strategy. Contact us at <a href=\"mailto:office@tenglerconsulting.com\">office@tenglerconsulting.com<\/a>\u00a0or connect with us on\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/tenglerconsulting\/\">LinkedIn<\/a>.<\/span><\/h3>[\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybercrime has long been a key supply chain risk. Attacks not only affect IT systems, but also paralyze logistics, production, and entire value chains. Companies must therefore strategically integrate cyber risks into their supply chain planning\u2014through clear governance, targeted supplier evaluation, and operational protective measures. Those who systematically build cyber resilience not only secure data, but also delivery capability and reputation.<\/p>\n","protected":false},"author":10,"featured_media":3278,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35,3],"tags":[],"class_list":["post-3274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-03-supply-chain-excellence","category-05-supply-chain-trends","grve-entry-item","grve-blog-item"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercrime in the Supply Chain | Tengler Consulting<\/title>\n<meta name=\"description\" content=\"Cyberattacks are disrupting supply chains. Learn how companies can integrate cyber risks into their SC strategy and build resilience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime in the Supply Chain | Tengler Consulting\" \/>\n<meta property=\"og:description\" content=\"Cyberattacks are disrupting supply chains. Learn how companies can integrate cyber risks into their SC strategy and build resilience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/\" \/>\n<meta property=\"og:site_name\" content=\"Tengler Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-20T16:29:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-06T08:27:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2025\/09\/Erdrutsch-Cover-Bild-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1438\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arne Siebott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arne Siebott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/\"},\"author\":{\"name\":\"Arne Siebott\",\"@id\":\"https:\/\/tenglerconsulting.com\/en\/#\/schema\/person\/41d2ce92a38b5bd34495343e7563841f\"},\"headline\":\"Cybercrime in the supply chain \u2013 What companies need to know now\",\"datePublished\":\"2025-10-20T16:29:37+00:00\",\"dateModified\":\"2026-02-06T08:27:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/\"},\"wordCount\":1571,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/tenglerconsulting.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2025\/09\/Erdrutsch-Cover-Bild-scaled.jpg\",\"articleSection\":[\"Supply Chain Excellence\",\"Trends\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/\",\"url\":\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/\",\"name\":\"Cybercrime in the Supply Chain | Tengler Consulting\",\"isPartOf\":{\"@id\":\"https:\/\/tenglerconsulting.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2025\/09\/Erdrutsch-Cover-Bild-scaled.jpg\",\"datePublished\":\"2025-10-20T16:29:37+00:00\",\"dateModified\":\"2026-02-06T08:27:03+00:00\",\"description\":\"Cyberattacks are disrupting supply chains. Learn how companies can integrate cyber risks into their SC strategy and build resilience.\",\"breadcrumb\":{\"@id\":\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#primaryimage\",\"url\":\"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2025\/09\/Erdrutsch-Cover-Bild-scaled.jpg\",\"contentUrl\":\"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2025\/09\/Erdrutsch-Cover-Bild-scaled.jpg\",\"width\":2560,\"height\":1438},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/tenglerconsulting.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime in the supply chain \u2013 What companies need to know now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tenglerconsulting.com\/en\/#website\",\"url\":\"https:\/\/tenglerconsulting.com\/en\/\",\"name\":\"Tengler Consulting\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/tenglerconsulting.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tenglerconsulting.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tenglerconsulting.com\/en\/#organization\",\"name\":\"Tengler Consulting\",\"url\":\"https:\/\/tenglerconsulting.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tenglerconsulting.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2024\/08\/tengler-consulting-logo-black-turquoise.svg\",\"contentUrl\":\"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2024\/08\/tengler-consulting-logo-black-turquoise.svg\",\"width\":535,\"height\":95,\"caption\":\"Tengler Consulting\"},\"image\":{\"@id\":\"https:\/\/tenglerconsulting.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tenglerconsulting\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/tenglerconsulting.com\/en\/#\/schema\/person\/41d2ce92a38b5bd34495343e7563841f\",\"name\":\"Arne Siebott\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tenglerconsulting.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e283e3d4fcfbad6277155c977ecf9b06f53c33ba9db05ee03e7edaab615d8c1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e283e3d4fcfbad6277155c977ecf9b06f53c33ba9db05ee03e7edaab615d8c1a?s=96&d=mm&r=g\",\"caption\":\"Arne Siebott\"},\"url\":\"https:\/\/tenglerconsulting.com\/en\/author\/arne-siebott\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime in the Supply Chain | Tengler Consulting","description":"Cyberattacks are disrupting supply chains. Learn how companies can integrate cyber risks into their SC strategy and build resilience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrime in the Supply Chain | Tengler Consulting","og_description":"Cyberattacks are disrupting supply chains. Learn how companies can integrate cyber risks into their SC strategy and build resilience.","og_url":"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/","og_site_name":"Tengler Consulting","article_published_time":"2025-10-20T16:29:37+00:00","article_modified_time":"2026-02-06T08:27:03+00:00","og_image":[{"width":2560,"height":1438,"url":"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2025\/09\/Erdrutsch-Cover-Bild-scaled.jpg","type":"image\/jpeg"}],"author":"Arne Siebott","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Arne Siebott","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#article","isPartOf":{"@id":"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/"},"author":{"name":"Arne Siebott","@id":"https:\/\/tenglerconsulting.com\/en\/#\/schema\/person\/41d2ce92a38b5bd34495343e7563841f"},"headline":"Cybercrime in the supply chain \u2013 What companies need to know now","datePublished":"2025-10-20T16:29:37+00:00","dateModified":"2026-02-06T08:27:03+00:00","mainEntityOfPage":{"@id":"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/"},"wordCount":1571,"commentCount":0,"publisher":{"@id":"https:\/\/tenglerconsulting.com\/en\/#organization"},"image":{"@id":"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#primaryimage"},"thumbnailUrl":"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2025\/09\/Erdrutsch-Cover-Bild-scaled.jpg","articleSection":["Supply Chain Excellence","Trends"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/","url":"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/","name":"Cybercrime in the Supply Chain | Tengler Consulting","isPartOf":{"@id":"https:\/\/tenglerconsulting.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#primaryimage"},"image":{"@id":"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#primaryimage"},"thumbnailUrl":"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2025\/09\/Erdrutsch-Cover-Bild-scaled.jpg","datePublished":"2025-10-20T16:29:37+00:00","dateModified":"2026-02-06T08:27:03+00:00","description":"Cyberattacks are disrupting supply chains. Learn how companies can integrate cyber risks into their SC strategy and build resilience.","breadcrumb":{"@id":"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#primaryimage","url":"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2025\/09\/Erdrutsch-Cover-Bild-scaled.jpg","contentUrl":"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2025\/09\/Erdrutsch-Cover-Bild-scaled.jpg","width":2560,"height":1438},{"@type":"BreadcrumbList","@id":"https:\/\/tenglerconsulting.com\/en\/cybercrime-in-the-supply-chain-what-companies-need-to-know-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/tenglerconsulting.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybercrime in the supply chain \u2013 What companies need to know now"}]},{"@type":"WebSite","@id":"https:\/\/tenglerconsulting.com\/en\/#website","url":"https:\/\/tenglerconsulting.com\/en\/","name":"Tengler Consulting","description":"","publisher":{"@id":"https:\/\/tenglerconsulting.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tenglerconsulting.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/tenglerconsulting.com\/en\/#organization","name":"Tengler Consulting","url":"https:\/\/tenglerconsulting.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tenglerconsulting.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2024\/08\/tengler-consulting-logo-black-turquoise.svg","contentUrl":"https:\/\/tenglerconsulting.com\/wp-content\/uploads\/2024\/08\/tengler-consulting-logo-black-turquoise.svg","width":535,"height":95,"caption":"Tengler Consulting"},"image":{"@id":"https:\/\/tenglerconsulting.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tenglerconsulting"]},{"@type":"Person","@id":"https:\/\/tenglerconsulting.com\/en\/#\/schema\/person\/41d2ce92a38b5bd34495343e7563841f","name":"Arne Siebott","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tenglerconsulting.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e283e3d4fcfbad6277155c977ecf9b06f53c33ba9db05ee03e7edaab615d8c1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e283e3d4fcfbad6277155c977ecf9b06f53c33ba9db05ee03e7edaab615d8c1a?s=96&d=mm&r=g","caption":"Arne Siebott"},"url":"https:\/\/tenglerconsulting.com\/en\/author\/arne-siebott\/"}]}},"_links":{"self":[{"href":"https:\/\/tenglerconsulting.com\/en\/wp-json\/wp\/v2\/posts\/3274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tenglerconsulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tenglerconsulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tenglerconsulting.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/tenglerconsulting.com\/en\/wp-json\/wp\/v2\/comments?post=3274"}],"version-history":[{"count":4,"href":"https:\/\/tenglerconsulting.com\/en\/wp-json\/wp\/v2\/posts\/3274\/revisions"}],"predecessor-version":[{"id":3382,"href":"https:\/\/tenglerconsulting.com\/en\/wp-json\/wp\/v2\/posts\/3274\/revisions\/3382"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tenglerconsulting.com\/en\/wp-json\/wp\/v2\/media\/3278"}],"wp:attachment":[{"href":"https:\/\/tenglerconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=3274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tenglerconsulting.com\/en\/wp-json\/wp\/v2\/categories?post=3274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tenglerconsulting.com\/en\/wp-json\/wp\/v2\/tags?post=3274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}