{"id":18347,"date":"2021-04-07T06:00:50","date_gmt":"2021-04-07T13:00:50","guid":{"rendered":"https:\/\/www.trulioo.com\/?p=18347"},"modified":"2023-08-01T16:25:20","modified_gmt":"2023-08-01T16:25:20","slug":"managing-supply-chain-risk","status":"publish","type":"post","link":"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk","title":{"rendered":"Managing supply chain risk: the due diligence is in the details"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"600\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/04\/Managing-supply-chain-risk.jpg\" alt=\"Managing supply chain risk\" class=\"wp-image-18348\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/04\/Managing-supply-chain-risk.jpg 900w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/04\/Managing-supply-chain-risk-740x493.jpg 740w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/04\/Managing-supply-chain-risk-48x32.jpg 48w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/figure>\n\n\n\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Accellion. SolarWinds. Microsoft Exchange. Until 2021, most of these names were familiar to many organizations as parts of a whole: pieces of the supply chain, providing services that supported day-to-day operations.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Now, they\u2019ve become better known as some of the biggest third-party breaches in recent history, allowing bad actors access to the systems and proprietary information of thousands of organizations worldwide.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">These events highlight the need (now more than ever) for organizations to be more proactive with their supplier risk management.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-some-context-for-supplier-breaches\"><b>Some context for supplier breaches<\/b><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">As of 2017,<\/span> <a href=\"https:\/\/www.esecurityplanet.com\/networks\/181-third-party-vendors-access-the-average-companys-network-each-week\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">the average company had 181 suppliers<\/span><\/a><span style=\"font-weight: 400;\"> access their network each week.<\/span> <span style=\"font-weight: 400;\">In 2018, <\/span><span style=\"font-weight: 400;\">Ponemon Institute<\/span><span style=\"font-weight: 400;\"> found that 59% of companies had experienced a <a href=\"https:\/\/www.businesswire.com\/news\/home\/20181115005665\/en\/Opus-Ponemon-Institute-Announce-Results-of-2018-Third-Party-Data-Risk-Study-59-of-Companies-Experienced-a-Third-Party-Data-Breach-Yet-Only-16-Say-They-Effectively-Mitigate-Third-Party-Risks\" target=\"_blank\" rel=\"noopener noreferrer\">third-party data breach<\/a>, but only 16% of companies thought they were effectively mitigating third-party risks. In 2020, research indicated that<\/span><a href=\"https:\/\/www.refinitiv.com\/en\/media-center\/press-releases\/2020\/may\/refinitiv-survey-exposes-severe-lack-of-due-diligence-on-business-supply-chains\" target=\"_blank\" rel=\"noopener noreferrer\"> <span style=\"font-weight: 400;\">43% of third-party relationships<\/span><\/a><span style=\"font-weight: 400;\"> never see any kind of due-diligence checks.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">With this sort of negative data, it\u2019s easy to understand the environment that makes suppliers look so very tempting to bad actors. Hacking the NSA and Microsoft would be time-consuming and challenging, but both organizations have an immense network of suppliers that expose them to risk. Even if every direct supplier were completely secure (which is unlikely), each of those suppliers has their own suppliers. And among those, some will be vulnerable to attack.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Hackers, like businesses, look for efficiencies. In the cases we saw in early 2021, <\/span><a href=\"https:\/\/www.marketwatch.com\/story\/lower-profile-accellion-hack-hit-dozens-of-high-profile-targets-including-kroger-csx-harvard-01615154005\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">hackers got into the systems<\/span><\/a><span style=\"font-weight: 400;\"> of three widely-used suppliers, and that in turn gave them access to multiple high-profile targets.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-supplier-risk-management\"><b>Supplier risk management<\/b><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Like many things in business, there\u2019s no such thing as zero risk. In the vast majority of cases, to run a business, suppliers are necessary, from data hosting, to the shop that customizes giveaway pens.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The only solution is to manage the risk. According to the <a href=\"https:\/\/www.ascm.org\/supply-chain-resilience\/\" target=\"_blank\" rel=\"noopener noreferrer\">Association for Supply Chain Management<\/a>:<\/span><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>Understanding who your critical first tier suppliers are should be the absolute bare minimum, and that starts with defining objective criteria to evaluate what makes a supplier critical in the first place.<\/p>\n<\/blockquote>\n\n\n\n<p><span style=\"font-weight: 400;\">At a high level, the key steps in supplier risk management are:<\/span><\/p>\n\n\n\n<p><b>Identification<\/b><\/p>\n\n\n\n<ul>\n<li>Maintain<span style=\"font-weight: 400;\"> a database of your suppliers<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Create a risk profile for each one<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Update the risk profile on a regular basis<\/span><\/li>\n<\/ul>\n\n\n\n<p><b>Assessment<\/b><\/p>\n\n\n\n<ul>\n<li><span style=\"font-weight: 400;\">Understand what level of risk the supplier poses (for example, what access they have, what could happen to your business if they were hacked or went out of business)<\/span><\/li>\n<\/ul>\n\n\n\n<p><b>Mitigation<\/b><\/p>\n\n\n\n<ul>\n<li><span style=\"font-weight: 400;\">Take the information from the identification and assessment stages and ask yourself, \u201cWhat if?\u201d (What if my data hosting location suffered a natural disaster? What could I do if it did? How would I respond to a third-party data leak?)<\/span><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"272\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/03\/6AMLD-Due-diligence-effective-systems-and-being-responsible.jpg\" alt=\"6AMLD - Due diligence, effective systems and being responsible\" class=\"wp-image-18254\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/03\/6AMLD-Due-diligence-effective-systems-and-being-responsible.jpg 900w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/03\/6AMLD-Due-diligence-effective-systems-and-being-responsible-740x224.jpg 740w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/03\/6AMLD-Due-diligence-effective-systems-and-being-responsible-106x32.jpg 106w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-due-diligence-in-supplier-risk-management\"><b>Due diligence in supplier risk management<\/b><\/h2>\n\n\n\n<p><a href=\"\/blog\/business-verification\/third-party-due-diligence\"><span style=\"font-weight: 400;\">Due diligence, or Know Your Business<\/span><\/a><span style=\"font-weight: 400;\">, is often seen as something that only financial institutions are required to undertake. However, structured appropriately, due diligence is a fundamental part of identifying and assessing risk, and can benefit any type of business.<\/span><\/p>\n\n\n\n<p><a href=\"https:\/\/www.kroll.com\/en-ca\/insights\/publications\/supply-chain-due-diligence-what-why-how\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Basic due diligence<\/span><\/a><span style=\"font-weight: 400;\"> answers questions like:<\/span><\/p>\n\n\n\n<ul>\n<li><span style=\"font-weight: 400;\">What kind of business are you signing a contract with?<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Where can you contact them?<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">What services do they provide?<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Is the business legitimate, or a PO box out to take your money and vanish?<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Is the new CEO competent and ethical, or do they have a string of bankrupt businesses behind them, or perhaps a cease-trade order?<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Is the business adequately insured if something goes wrong?<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Will the business protect your information adequately?<\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">This kind of information supports the creation of a supplier database, and provides a basic risk profile. Risk profiles can easily be augmented, depending on need and business vertical, with industry-standard questionnaires such as the<\/span> <a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/caiq-lite\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">CAIQ-lite<\/span><\/a><span style=\"font-weight: 400;\">, which assesses security in the cloud.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Due diligence also plays into assessing the risk the supplier poses to a business. The risk profile provided by due diligence gives businesses a baseline when it comes to evaluating what systems and information access a supplier can be granted without exceeding the business\u2019s risk tolerance.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">For example, the stationery supplier may be a high risk in terms of information security <\/span>\u2014 <span style=\"font-weight: 400;\">but will only ever have direct access to very limited information. Likewise, that supplier is a small organization without much resilience in the event of something like its storage area catching fire <\/span>\u2014 <span style=\"font-weight: 400;\">but the risk posed to your business continuity if the company goes out of business is minimal.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Due diligence also supports risk mitigation. If, for example, a supplier risk profile shows that the supplier is non-compliant with a law your business must comply with, that information can feed into the contracting stage as a contractual requirement: the supplier must make all commercially reasonable efforts to become compliant.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-chain-is-only-as-strong-as-its-weakest-link\"><b>A chain is only as strong as its weakest link<\/b><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">It\u2019s important to keep in mind that<\/span> <a href=\"https:\/\/www.arachnys.com\/supply-chain-due-diligence-is-faltering-heres-how-to-tackle-it\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">the supply chain is only as strong as the most vulnerable<\/span><\/a>&nbsp;\u2014 <span style=\"font-weight: 400;\">or most targeted <\/span>\u2014 <span style=\"font-weight: 400;\">supplier.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Without the awareness of supply chain vulnerabilities and without a monitoring and mitigation plan in place, companies leave themselves wide open to the potential for damaging breaches and exploits. Worse yet, without that supplier oversight in place, a company may not even know that a supplier is at risk until they show up in the headlines.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Supply chain risk management and due diligence work hand-in-hand to form a first layer of protection for businesses, and with the rise in SaaS and outsourcing prevalent in the business environment, good risk awareness is vital.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"Accellion. SolarWinds. Microsoft Exchange. Until 2021, most of these names were familiar to many organizations&#8230;","protected":false},"author":7,"featured_media":18348,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"footnotes":""},"categories":[328],"post-types":[148,205],"post-topics":[111,99],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.1 (Yoast SEO v22.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Managing supply chain risk: the due diligence is in the details<\/title>\n<meta name=\"description\" content=\"Supply chain risk management and due diligence work hand-in-hand to form a first layer of protection for businesses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managing supply chain risk: the due diligence is in the details\" \/>\n<meta property=\"og:description\" content=\"Supply chain risk management and due diligence work hand-in-hand to form a first layer of protection for businesses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk\" \/>\n<meta property=\"og:site_name\" content=\"Trulioo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trulioo\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-07T13:00:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-01T16:25:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/04\/Managing-supply-chain-risk.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bond Lai\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trulioo\" \/>\n<meta name=\"twitter:site\" content=\"@trulioo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bond Lai\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk\"},\"author\":{\"name\":\"Bond Lai\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/c019180cc6a5cff73b8cce8518bd97b8\"},\"headline\":\"Managing supply chain risk: the due diligence is in the details\",\"datePublished\":\"2021-04-07T13:00:50+00:00\",\"dateModified\":\"2023-08-01T16:25:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk\"},\"wordCount\":902,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"articleSection\":[\"Business Verification (KYB)\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk\",\"url\":\"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk\",\"name\":\"Managing supply chain risk: the due diligence is in the details\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/#website\"},\"datePublished\":\"2021-04-07T13:00:50+00:00\",\"dateModified\":\"2023-08-01T16:25:20+00:00\",\"description\":\"Supply chain risk management and due diligence work hand-in-hand to form a first layer of protection for businesses.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trulioo.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business Verification (KYB)\",\"item\":\"https:\/\/www.trulioo.com\/post-topics\/business-verification\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Managing supply chain risk: the due diligence is in the details\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trulioo.com\/#website\",\"url\":\"https:\/\/www.trulioo.com\/\",\"name\":\"Trulioo\",\"description\":\"Building trust online (online identity verification services)\",\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trulioo.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.trulioo.com\/#organization\",\"name\":\"Trulioo\",\"url\":\"https:\/\/www.trulioo.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"contentUrl\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"width\":2784,\"height\":1464,\"caption\":\"Trulioo\"},\"image\":{\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/trulioo\",\"https:\/\/twitter.com\/trulioo\",\"https:\/\/www.linkedin.com\/company\/trulioo\",\"https:\/\/www.instagram.com\/trulioo_global\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/c019180cc6a5cff73b8cce8518bd97b8\",\"name\":\"Bond Lai\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f17fb4de5ef8ab9d1c56147ad8d3b08?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f17fb4de5ef8ab9d1c56147ad8d3b08?s=96&d=mm&r=g\",\"caption\":\"Bond Lai\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Managing supply chain risk: the due diligence is in the details","description":"Supply chain risk management and due diligence work hand-in-hand to form a first layer of protection for businesses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk","og_locale":"en_US","og_type":"article","og_title":"Managing supply chain risk: the due diligence is in the details","og_description":"Supply chain risk management and due diligence work hand-in-hand to form a first layer of protection for businesses.","og_url":"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk","og_site_name":"Trulioo","article_publisher":"https:\/\/www.facebook.com\/trulioo","article_published_time":"2021-04-07T13:00:50+00:00","article_modified_time":"2023-08-01T16:25:20+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/04\/Managing-supply-chain-risk.jpg","type":"image\/jpeg"}],"author":"Bond Lai","twitter_card":"summary_large_image","twitter_creator":"@trulioo","twitter_site":"@trulioo","twitter_misc":{"Written by":"Bond Lai","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk#article","isPartOf":{"@id":"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk"},"author":{"name":"Bond Lai","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/c019180cc6a5cff73b8cce8518bd97b8"},"headline":"Managing supply chain risk: the due diligence is in the details","datePublished":"2021-04-07T13:00:50+00:00","dateModified":"2023-08-01T16:25:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk"},"wordCount":902,"commentCount":0,"publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"articleSection":["Business Verification (KYB)"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk","url":"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk","name":"Managing supply chain risk: the due diligence is in the details","isPartOf":{"@id":"https:\/\/www.trulioo.com\/#website"},"datePublished":"2021-04-07T13:00:50+00:00","dateModified":"2023-08-01T16:25:20+00:00","description":"Supply chain risk management and due diligence work hand-in-hand to form a first layer of protection for businesses.","breadcrumb":{"@id":"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trulioo.com\/"},{"@type":"ListItem","position":2,"name":"Business Verification (KYB)","item":"https:\/\/www.trulioo.com\/post-topics\/business-verification"},{"@type":"ListItem","position":3,"name":"Managing supply chain risk: the due diligence is in the details"}]},{"@type":"WebSite","@id":"https:\/\/www.trulioo.com\/#website","url":"https:\/\/www.trulioo.com\/","name":"Trulioo","description":"Building trust online (online identity verification services)","publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trulioo.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.trulioo.com\/#organization","name":"Trulioo","url":"https:\/\/www.trulioo.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","contentUrl":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","width":2784,"height":1464,"caption":"Trulioo"},"image":{"@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/trulioo","https:\/\/twitter.com\/trulioo","https:\/\/www.linkedin.com\/company\/trulioo","https:\/\/www.instagram.com\/trulioo_global\/"]},{"@type":"Person","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/c019180cc6a5cff73b8cce8518bd97b8","name":"Bond Lai","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8f17fb4de5ef8ab9d1c56147ad8d3b08?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f17fb4de5ef8ab9d1c56147ad8d3b08?s=96&d=mm&r=g","caption":"Bond Lai"}}]}},"_links":{"self":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/18347"}],"collection":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/comments?post=18347"}],"version-history":[{"count":1,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/18347\/revisions"}],"predecessor-version":[{"id":36378,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/18347\/revisions\/36378"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media\/18348"}],"wp:attachment":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media?parent=18347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/categories?post=18347"},{"taxonomy":"post-types","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-types?post=18347"},{"taxonomy":"post-topics","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-topics?post=18347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}