5 steps to strengthen cyber defences against third-party risk

26 May 2025 Consultancy.uk

Following a wave of high-profile cyber-attacks on major UK retailers including M&S, Co-op and Harrods, cyber security experts from around the country are urging companies to tighten supply chain security to avoid becoming the next headline. Katherine Kearns from S-RM shares five key steps organisations can take to strengthen their cyber defences against third-party risk.

1) Identify critical vendors

Begin by understanding the organisation’s third-party exposure and the impact this can have on the business. It is particularly important to identify and inventory third-party suppliers that have access to sensitive data, have access into your internal environment, provide critical software, and could significantly affect business continuity if disrupted. 

2) Implement continuous monitoring

Move beyond point-in-time assessments. Use automated tools and threat intelligence to continuously monitor vendor security postures and flag emerging risks.

3) Integrate vendors into continuity plans

Validate business continuity and disaster recovery plans adopted by the suppliers and align your own incident response and business continuity plans with them. Establish redundancies and workarounds to avoid single points of failure. Exercise disruptive scenarios with critical suppliers to improve joint recovery processes, exercise communication plans during critical events, and build muscle memory around critical decision-making.

4) Mandate security controls contractually

Include clear security obligations in supplier contracts. These should cover access controls, encryption standards, breach notification protocols and right-to-audit clauses. Include compliance with the contractual security obligations in the security posture assessment of the critical third-parties.

5) Secure your own perimeter

Strengthen your internal defences to mitigate damage if a third-party is compromised. Prioritise measures around:

  • Employee training and social engineering awareness, including implementing additional security verification procedures to prevent impersonation of employees and third-parties with access to the environment
  • Heightened security protocols for account reset or credential reminder requests
  • Enhanced monitoring of third-party user activity
  • Continuous identification and monitoring of the external attack surface, including new internet-facing assets and vulnerable remote access methods

Hacks in retail

In recent weeks, the UK’s retail sector has been rattled by high-profile cyber hacks. At M&S, hackers gaining access to its systems via one of its contractors through the use of advanced social engineering techniques. M&S chief executive, Stuart Machin, said it will take an estimated £300 million hit to profits this year from the damaging cyber-attack that it expects to disrupt its online business into July.

Earlier, Harrods and Co-op also faced hack incidents, although they have had less of an impact than the M&S attack.

The National Cyber Security Centre (NCSC) is working with both M&S and the Co-op, while the Metropolitan Police's Cyber Crime Unit and the National Crime Agency (NCA) is investigating the M&S attack.

More on: S-RM
United Kingdom
Company profile
S-RM is not a United Kingdom partner of Consultancy.org
Partnership information »
Partnership information

Consultancy.org works with three partnership levels: Local, Regional and Global.

S-RM is a not a partner of Consultancy.org.

Upgrade or more information? Get in touch with our team for details.