Plaintext with Rich
Cybersecurity is an everyone problem. So why does it always sound like it’s only for IT people?
Each week, Rich takes one topic, from phishing to ransomware to how your phone actually tracks you, and explains it in plain language in under ten minutes or less. No buzzwords. No condescension. Just the stuff you need to know to stay safer online, explained like you’re a smart person who never had anyone break it down properly. Because you are!
Plaintext with Rich
How Supply Chain Attacks Turn Trust Into Exposure
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
Your defenses can be flawless and still fail when the breach starts upstream. We unpack how modern supply chains software updates, cloud services, MSPs, contractors, and open source libraries turn everyday trust into an attack surface, and what it takes to build resilience without grinding work to a halt. From tampered updates to phished third-party accounts and poisoned dependencies, we map the repeat patterns that let one supplier compromise ripple into hundreds of customers, and explain why these intrusions look like routine business rather than obvious threats.
We keep it plain and practical with a starter kit designed for high impact: identify your crown jewels so protection has focus, list the vendors who hold your data or access, enforce least privilege ruthlessly, and treat vendor logins like production keys with mandatory MFA. Then, level up with targeted visibility monitor unusual vendor behavior such as new locations, large downloads, permission spikes, or disabled controls and move fast on critical patches for shared components, because common libraries create common urgency. We also cover the questions that separate security theater from reality: MFA by default, patch timelines for critical CVEs, incident notification practices, role-based access, and SSO support.
Contracts matter, so put expectations in writing: breach notification windows, required controls, and clear ownership. And when all else fails, tested backups are the difference between disaster and a brief interruption restore drills turn plans into confidence. Smaller teams aren’t spared; they often depend on more third-party tools and get caught in the collateral damage when a popular vendor is hit. You can’t control every supplier, but you can control access, monitoring, and recovery. List your vendors, enforce MFA on every vendor account, limit access aggressively, and verify backups by doing a real restore. If this breakdown helps, subscribe, share it with a teammate, and leave a quick review so others can find it too.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene
You can lock down every system you own, patch everything, train everyone, and still lose control. Because the failure didn't actually start with you or inside your organization. It started somewhere else upstream. Welcome to plain text with rich. Today we're talking about supply chain cybersecurity. Now, let's start by translating the phrase because supply chain sounds abstract for a lot of people until it suddenly isn't. And in plain text, your supply chain is everything you rely on that you didn't build yourself. Think about this software you install, cloud services you log into, vendors that store your data, IT providers with access, contractors, open source code inside your applications, sometimes even hardware and firmware. If it helps you operate and someone else controls part of that, it's in your supply chain. Supply chain cybersecurity is about one uncomfortable reality. If attackers can't get to you directly, they look for someone you already trust. Again, not because you're careless, because trust is efficient and attackers, well, they like efficiency. So what does a supply chain attack actually look like in the real world? There are a few repeat patterns that would show up. One is tampered updates. You install software from a legitimate vendor, the update looks real because it is real, but something upstream was compromised before it reached you. Now, no alarms, no obvious warning. You let the attackers in yourself because the process told you it was safe. Another pattern is vendor breaches. Again, your organization isn't hacked directly, but your vendor is. Your data lives in their systems. Their security failure becomes your incident. Another pattern would be third-party access. Think about a contractor or service provider that has a login to your environment. They get phished, their account becomes the attacker's account. And of course, there's always going to be dependency risk, right? Modern software isn't written from scratch, it's assembled from libraries, packages, plugins. If one of those components is malicious, outdated, or impersonated, your application inherits the risk automatically. And when we look at all these, there's a common thread. Supply chain attacks scale. Compromise one supplier, impact hundreds or thousands of downstream customers. That's why attackers are starting to love them. So when we think about this, why are these attacks so difficult to fend against? It's because they ride on legitimate trust. Most security advice sounds like don't click weird links, don't open suspicious files. Supply chain attacks don't look suspicious. They look like your update system, your vendor portal, your IT provider, your normal workflow. Again, the attacker isn't breaking in, they're arriving through a door that you already use. That doesn't mean trust is bad. It means unbounded trust is fragile. Good security doesn't eliminate trust. Remember, it limits how much damage trust can cause when it fails. So if we got practical for this, right, our plaintext supply chain starter kit, again, high leverage, low drama. We have four things you can look at here. Step one, identify what actually matters, right? What data or systems would hurt most to lose? Customer information, financial records, employee data, source code, production environments, right? If you can't name your crown jewels, everything feels equally urgent and nothing gets protected well. Then we want to map your real vendors, right? Not a massive spreadsheet. Just answer this question: who has your data, your logins, or access to your systems? That shortlist is your supply chain risk surface. In step three, we'd want to limit vendor access aggressively. Again, lease privilege isn't optional here, and lease privilege is one of my favorite things in the entire world. If a vendor needs access to one tool, give them one tool. If they need access temporarily, make it temporary. If they don't need admin, don't give admin. Convenience expands the blast radius. Boundaries are going to contain it. Step four, protect your vendor logins like production keys. Mandatory multi-factor authentication, no exceptions. If a vendor account can touch production, it deserves stronger protection than a normal user account. And because we'd like to add a little bit more, if you can do more, maybe look at these. Step five, monitor vendor behavior. Again, you don't need paranoia, you just need visibility. Things like new locations, unusual downloads, permission changes, right? Security controls being disabled. You're not watching people, you're watching systems behave oddly. Step six, patch shared dependencies fast. When a widely used vendor or library issues a critical fix, any kind of delay is going to compound that risk, right? Shared components mean shared urgency. For step seven, ask better questions before you buy, you know, not security theater, just plain text questions. Do you use MFA? How fast do you patch critical issues? How do you notify customers after incidents? Can access be limited by role? Do you support SSO? Again, these aren't gotcha questions. They're more responsibility questions. Step eight, put security expectations in writing. Contracts matter, breach notification timeline, security requirements, clear ownership. Again, I mentioned it a lot already in plenty of different episodes. Hope is not a control. Put it in writing and let it rip. Step nine, backups and recovery. Because hey, sometimes everything else still fails, no matter how good we're trying to do. Good backups turn disasters into the slight interruptions. And backups again only count if you can restore them. So make sure that if we are making backups, we are testing backups. So a quick reality check before we wrap up. Supply chain security isn't just for massive enterprises. Smaller organizations are affected constantly because they also rely on those same tools, if not more of them, because they are a smaller organization that can't build their own things. Trusted vendors are not safer by default. They're higher value targets. And you are not powerless here. You may not control vendor security, but you do control access, monitoring, and recovery. And that's where resilience lives. Supply chain cybersecurity is about managing the risk introduced by the tools and partners you rely on, not eliminating trust, right? Designing for when that trust breaks. If you take four actions this week when it comes to this, hey, again, list the vendors that touch your systems or data, enforce MFA on every vendor account, limit vendor agency or access aggressively, verify your backups, actually restore. That's real progress. As always, if there's a security topic you want broken down in plain text, send it my way, email, DM, drop it in the comments. However, you reach me, I will read it, I will reply. If this episode helped, share it with someone who'd actually benefit. That'd be amazing. This has been plain text with rich. 10 minutes or less, one topic, no panic. I'll see you next time.