This article has been indexed from Security on TechRepublic Stay up to date for a lifetime with this cybersecurity training bundle with more than 1,000 hours of instruction. Read the original article: Get 1,000 hours of cybersecurity training for $21…
Tag: Security on TechRepublic
Apple needs to un-Mac-ify security and privacy in Safari
This article has been indexed from Security on TechRepublic Safari is a good browser, but it could be better. Unfortunately, one area that requires improvement is the un-Mac-ifying of the privacy settings. Find out what Jack Wallen means by this.…
How to identify social media misinformation and protect your business
This article has been indexed from Security on TechRepublic Social media has become an integral part of modern communications, providing valuable information to businesses and individuals. Unfortunately, some of that information is just plain wrong or misleading. Read the original…
Dump Chrome as your default browser on Android
This article has been indexed from Security on TechRepublic Jack Wallen tells us why Android users should switch from Chrome as their default browsers. Read the original article: Dump Chrome as your default browser on Android
If you’re serious about privacy, it’s time to use DuckDuckGo as your default Android browser
This article has been indexed from Security on TechRepublic Third-party app trackers have become a real problem on Android, and DuckDuckGo is doing something about it. Find out why Jack Wallen believes this is the browser you need to use.…
US government warns of increased ransomware threats during Thanksgiving
This article has been indexed from Security on TechRepublic Though the feds haven’t identified any specific known threats, criminals are prone to strike when key employees are traveling or spending time with family and friends. Read the original article: US…
Can’t remember ordering that package? Don’t click on unfamiliar links sent via text
This article has been indexed from Security on TechRepublic Proofpoint finds that bad actors are using SMS messages about package deliveries as the bait in new scams. Read the original article: Can’t remember ordering that package? Don’t click on unfamiliar…
How to install and use InVID, a plugin to debunk fake news and verify videos and images
This article has been indexed from Security on TechRepublic You can make sure you aren’t seeing fake news, edited photos or deepfakes with this software. Here’s how to install and use it. Read the original article: How to install and…
GoDaddy security breach impacts more than 1 million WordPress users
This article has been indexed from Security on TechRepublic The hosting company has revealed a security incident that exposed the email addresses and customer numbers of 1.2 million Managed WordPress customers. Read the original article: GoDaddy security breach impacts more…
Leaders agree that cybersecurity is a business risk, but are they acting on that belief?
This article has been indexed from Security on TechRepublic Despite nearly unanimous agreement, there’s still a lack of clarity on who is accountable for security incidents and whether previous security investments have paid off, a Gartner survey finds. Read the…
Mozilla has released a new platform for privacy-focused email communications
This article has been indexed from Security on TechRepublic When you don’t want to give out your personal or work email address, but still need to sign up for an account, Mozilla might have an answer for you with Firefox…
8 advanced threats Kaspersky predicts for 2022
This article has been indexed from Security on TechRepublic Advanced threats constantly evolve. This year saw multiple examples of advanced persistent threats under the spotlight, allowing us to predict what threats might lead the future. Read the original article: 8…
Cisco partners with JupiterOne to enhance its SecureX product portfolio
This article has been indexed from Security on TechRepublic The new product, Cisco Secure Cloud Insights, offers cloud inventory tracking and relationship mapping to navigate public clouds as well as access rights management and security compliance reporting. Read the original…
Policymakers want to regulate AI but lack consensus on how
This article has been indexed from Security on TechRepublic Commentary: AI is considered “world changing” by policymakers, but it’s unclear how to ensure positive outcomes. Read the original article: Policymakers want to regulate AI but lack consensus on how
How to install the OpenSSH server on Windows with PowerShell
This article has been indexed from Security on TechRepublic If you’ve ever had a need to SSH into a Windows machine, Jack Wallen shows you how to make that possible with the help of PowerShell. Read the original article: How…
Windows 11 SE: Why it’s both more and less locked down than Windows 10 S
This article has been indexed from Security on TechRepublic Managing computers for education is complicated, but Microsoft thinks it has a solution. Read the original article: Windows 11 SE: Why it’s both more and less locked down than Windows 10…
Consumers like the benefits of online shopping despite the security risks
This article has been indexed from Security on TechRepublic Only 25% of consumers surveyed by NTT Application Security said they’d take their online business elsewhere following a data breach. Read the original article: Consumers like the benefits of online shopping…
How midsize companies are vulnerable to data breaches and other cyberattacks
This article has been indexed from Security on TechRepublic Midsize companies often lack the staff, expertise and expensive tools needed to defend themselves against attack, says security provider Coro. Read the original article: How midsize companies are vulnerable to data…
5 predictions to help you focus your web app security resources in 2022
This article has been indexed from Security on TechRepublic This is the year business leaders will learn just how innovative online criminals have become, and it’ll take rethinking how we perceive account security to fight it, says PerimeterX CTO Ido…
How to beef up your multicloud security
This article has been indexed from Security on TechRepublic A majority of IT leaders surveyed by Valtix said they realize their employees lack the necessary skills to manage multicloud security. Read the original article: How to beef up your multicloud…
How to protect your organization from ransomware attacks during the holiday season
This article has been indexed from Security on TechRepublic A quarter of security pros polled by Cybereason said they lack a plan to deal with a ransomware attack during a weekend or holiday. Read the original article: How to protect…
Your weak passwords can be cracked in less than a second
This article has been indexed from Security on TechRepublic Easy-to-crack phrases “123456,” “123456789,” “12345,” “qwerty” and “password” are the five most common passwords, says NordPass. Read the original article: Your weak passwords can be cracked in less than a second
14 tactics to use during a ransomware negotiation
This article has been indexed from Security on TechRepublic Security researchers analyzed 700 incidents to understand the economics of these threats as well as what bargaining tactics work. Read the original article: 14 tactics to use during a ransomware negotiation
Fear and shame are making it harder to fight ransomware and accidental data loss, report finds
This article has been indexed from Security on TechRepublic A third of employees admit lying to hide the fact that they accidentally deleted data, most doing so out of embarrassment or fear of punishment. Even more would lie about a…
Cybersecurity is a growing field that can benefit from hiring veterans
This article has been indexed from Security on TechRepublic There is a real need for “boots-on-the-ground” cybersecurity professionals, so why not tap into a pool of trained and motivated veterans? Read the original article: Cybersecurity is a growing field that…
Fake emails exploited FBI email service to warn of phony cyberattacks
This article has been indexed from Security on TechRepublic A hacker has taken responsibility for the compromise, saying they did it to highlight a vulnerability in the FBI’s system. Read the original article: Fake emails exploited FBI email service to…
How organizations are beefing up their cybersecurity to combat ransomware
This article has been indexed from Security on TechRepublic Most organizations surveyed by Hitachi ID are moving partly to software-as-a-service. Less than half have adopted a Zero Trust strategy. Read the original article: How organizations are beefing up their cybersecurity…
Don’t fall for LinkedIn phishing: How to watch for this credential-stealing attack
This article has been indexed from Security on TechRepublic Cybercriminals are now using LinkedIn to find a way into your files. Learn how to detect phishing on LinkedIn and protect yourself from it. Read the original article: Don’t fall for…
Facebook and Google “listening” is more pervasive than you think
This article has been indexed from Security on TechRepublic Yet another consumer is disturbed by the sketchy algorithms deployed by Facebook. Here’s how the app knows what you’re talking about and what to do about it. Read the original article:…
Malicious shopping websites surge in number in advance of Black Friday
This article has been indexed from Security on TechRepublic More than 5,300 malicious websites have popped up each week, the highest since the start of 2021, says Check Point Research. Read the original article: Malicious shopping websites surge in number…
Security researcher: Flaw in Apple Pay, Samsung Pay and Google Pay makes fraud easy for thieves
This article has been indexed from Security on TechRepublic Positive Technologies expert describes vulnerability linked to apps used to pay for public transit tickets. Read the original article: Security researcher: Flaw in Apple Pay, Samsung Pay and Google Pay makes…
Save an extra 15% off training in ethical hacking with this pre-Black Friday sale deal
This article has been indexed from Security on TechRepublic Develop the necessary skills and use the tools to be an ethical hacker through this 120-hour comprehensive course bundle. Read the original article: Save an extra 15% off training in ethical…
How AI fights fraud in the telecom industry
This article has been indexed from Security on TechRepublic Americans lost $29.8 billion in phone fraud over the past year. Can AI fraud detection change this? Read the original article: How AI fights fraud in the telecom industry
Pay-per-click fraud is costing top tech companies, and you, hundreds of millions of dollars
This article has been indexed from Security on TechRepublic With an estimated 14% of PPC costs being lost to fraud, all it takes is a look at the advertising budgets of top tech firms to see how much money they’re…
The mobile VPNs of 2021 that you need to try
This article has been indexed from Security on TechRepublic Privacy is essential, especially on a mobile device. These five options available for both Android and iOS can help keep your device secure and your traffic private, but not without cost.…
Learn how to become an ethical hacker for only $21 during this pre-Black Friday sale
This article has been indexed from Security on TechRepublic You don’t need to break the bank to get the training required for an exciting new career, especially when you’ve got the right coupon code. Read the original article: Learn how…
Research: Supply chain and COVID-19 challenges forces companies to shift their security strategies
This article has been indexed from Security on TechRepublic 64% of survey respondents reported that their companies have concerns about security risks for supply chains. Read the original article: Research: Supply chain and COVID-19 challenges forces companies to shift their…
This pre-Black Friday sale lets you save an extra 15% off cybersecurity certification training courses
This article has been indexed from Security on TechRepublic Receive over 100 hours of expert instruction on globally recognized cybersecurity skills that will help you become an in-demand IT professional. Read the original article: This pre-Black Friday sale lets you…
How to easily transfer files between computers with croc
This article has been indexed from Security on TechRepublic If you’re looking for an easy command-line tool to transfer files between systems on the same LAN, Jack Wallen believes croc is the tool for the job. Read the original article:…
How cybercriminals use bait attacks to gather info about their intended victims
This article has been indexed from Security on TechRepublic With a bait attack, criminals try to obtain the necessary details to plan future attacks against their targets, says Barracuda. Read the original article: How cybercriminals use bait attacks to gather…
These industries were the most affected by the past year of ransomware attacks
This article has been indexed from Security on TechRepublic After what has been a year of averaging more than a thousand ransomware attacks per day, NordLocker said that data released by hackers shows an unexpected industry at the top. Read…
How healthcare organizations and patients are increasingly at risk from cyber threats
This article has been indexed from Security on TechRepublic A majority of IT pros working at hospitals who were surveyed by Armis said they’ve seen a rise in cyber risk over the past 12 months. Read the original article: How…
It’s time to dump Chrome as your default browser on Android
This article has been indexed from Security on TechRepublic Jack Wallen makes his case for Android users to switch from Chrome as their default browsers. He also shows you how. Read the original article: It’s time to dump Chrome as…
It’s time you dump Chrome as your default browser on Android
This article has been indexed from Security on TechRepublic Jack Wallen makes his case for Android users to switch from Chrome as their default browsers. He also shows you how. Read the original article: It’s time you dump Chrome as…
Security pros say federal government should do more to protect and secure private sector
This article has been indexed from Security on TechRepublic A full 95% of professionals surveyed by Tripwire believe the government should play a bigger role in securing non-governmental companies. Read the original article: Security pros say federal government should do…
Ransomware attacks are increasingly exploiting security vulnerabilities
This article has been indexed from Security on TechRepublic The number of security flaws associated with ransomware rose from 266 to 278 last quarter, according to security firm Ivanti. Read the original article: Ransomware attacks are increasingly exploiting security vulnerabilities
Digital driver’s licenses: Are they secure enough for us to trust?
This article has been indexed from Security on TechRepublic States should use a privacy by design approach instead of creating a new system to track purchases and other activities, according to security experts. Read the original article: Digital driver’s licenses:…
Kaspersky finds 31% increase in “smart” DDoS attacks
This article has been indexed from Security on TechRepublic The security company expects these attacks to keep rising through the end of the year. Read the original article: Kaspersky finds 31% increase in “smart” DDoS attacks
US amps up war on ransomware with charges against REvil attackers
This article has been indexed from Security on TechRepublic One person fingered for the July 2021 attack against Kaseya is in custody, while the other individual is still at large. Read the original article: US amps up war on ransomware…
Europol arrests three suspects possibly involved in major ransomware activities
This article has been indexed from Security on TechRepublic Europol announced new arrests during its “Operation GoldDust.” The suspects may have been heavily involved in the Sodinokibi/REvil and GandCrab ransomware activities. Read the original article: Europol arrests three suspects possibly…
Cybersecurity: Track data activity before “unusual” becomes dangerous
This article has been indexed from Security on TechRepublic A security expert raises concerns that a lack of identifying and tracking unusual data activity can have dangerous consequences. Read the original article: Cybersecurity: Track data activity before “unusual” becomes dangerous
Track data activity before “unusual” becomes “dangerous”
This article has been indexed from Security on TechRepublic A security expert raises concerns that a lack of identifying and tracking unusual data activity can have dangerous consequences. Read the original article: Track data activity before “unusual” becomes “dangerous”
US government unveils $10 million bounty for DarkSide ransomware gang leaders
This article has been indexed from Security on TechRepublic The $10 million is for intel that leads to the identification or location of anyone who holds a leadership position in the DarkSide group. Read the original article: US government unveils…
Voice phishing attack spoofs Amazon to steal credit card information
This article has been indexed from Security on TechRepublic Impersonating an Amazon order notification, the attackers end up calling victims to try to obtain their credit card details, says Avanan. Read the original article: Voice phishing attack spoofs Amazon to…
Get the training you need to switch to a cybersecurity career
This article has been indexed from Security on TechRepublic With cybercrime becoming more frequent and severe, there’s no question that the demand for cybersecurity skills will remain high well into the future, and now you can learn them easily. Read…
Cybersecurity, the pandemic and the 2021 holiday shopping season: A perfect storm
This article has been indexed from Security on TechRepublic Ping Identity executive advisor Aubrey Turner warns that eager cybercriminals are ready to exploit the current chaotic state of the world, and preparation is essential going into the holidays. Read the…
You can configure SSH to use a non-standard port with SELinux set to enforcing
This article has been indexed from Security on TechRepublic Switching the SSH listening port is an easy way to help secure remote login on your Linux servers. Jack Wallen shows you how. Read the original article: You can configure SSH…
US government orders federal agencies to patch 100s of vulnerabilities
This article has been indexed from Security on TechRepublic The Cybersecurity and Infrastructure Security Agency is maintaining a database of known security flaws with details on how and when federal agencies and departments should patch them. Read the original article:…
2022 will be the year of convergence between edge, IoT and networking tech, Forrester predicts
This article has been indexed from Security on TechRepublic IoT tech will help reduce emissions, satellite internet will challenge 5G, the chip shortage will continue and more will happen in 2022 as pandemic recovery continues to move slowly forward. Read…
Break into the cybersecurity field by learning the NIST risk management framework
This article has been indexed from Security on TechRepublic Now you can leverage your advanced IT experience to switch to an exciting new career in cybersecurity, by starting with a narrow specialization and advancing from there. Read the original article:…
Cisco Talos reports new variant of Babuk ransomware targeting Exchange servers
This article has been indexed from Security on TechRepublic A new bad actor called Tortilla is running the campaign, and most affected users are in the U.S. Read the original article: Cisco Talos reports new variant of Babuk ransomware targeting…
Data and the policies that protect it: 4 essential plans to have in place
This article has been indexed from Security on TechRepublic These four sample policies can help you protect your data by ensuring it’s properly encrypted, stored safely, only accessible by certain people, and securely backed up. Read the original article: Data…
BlackMatter ransomware gang allegedly disbanding due to pressure from authorities
This article has been indexed from Security on TechRepublic Operators of the ransomware-as-a-service group are claiming that the project is closed and that their entire infrastructure will be turned off. Read the original article: BlackMatter ransomware gang allegedly disbanding due…
Report: More than half of organizations do not effectively defend against cyberattacks
This article has been indexed from Security on TechRepublic Accenture’s State of Cyber Resilience study also revealed key traits of cyber resilient leaders. The report found an average of 270 attacks per year per company. Read the original article: Report:…
Rootkits: Expensive to build, cheap to rent
This article has been indexed from Security on TechRepublic Positive Technology analysts found ready-made malware for any budget as well as the option to have a custom-build rootkit on Dark Web forums. Read the original article: Rootkits: Expensive to build,…
Digital natives more likely to fall for phishing attacks at work than their Gen X and Boomer colleagues
This article has been indexed from Security on TechRepublic SailPoint survey finds that younger workers also are more likely to use company email addresses for online shopping and subscriptions. Read the original article: Digital natives more likely to fall for…
Ransomware gangs leaking sensitive financial information to extort organizations
This article has been indexed from Security on TechRepublic Attackers will threaten to release confidential data that could affect a company’s stock price to pressure them to pay the ransom, says the FBI. Read the original article: Ransomware gangs leaking…
Secure SSH logins with knockd
This article has been indexed from Security on TechRepublic You need to lock down your servers so that only you have access via SSH. One way to help that is with knockd. Jack Wallen shows you how. Read the original…
10 ways ransomware attackers pressure you to pay the ransom
This article has been indexed from Security on TechRepublic Attackers will vow to publicly release the stolen data, try to delete any backups and even deploy DDoS attacks to convince victims to give in to the ransom demands, says Sophos.…
Cybercrime: Europol arrests 12 people for ransomware activities possibly affecting 1,800 victims in 71 countries
This article has been indexed from Security on TechRepublic The European police force stated the ransomware activities targeted critical infrastructures and mostly large corporations. Read the original article: Cybercrime: Europol arrests 12 people for ransomware activities possibly affecting 1,800 victims…
How to prepare your team to address a significant security issue
This article has been indexed from Security on TechRepublic As you work to resolve a security issue, technical knowledge is necessary—and a team with a broad base of expertise is invaluable. Read the original article: How to prepare your team…
Develop the skills required for an in-demand cybersecurity career
This article has been indexed from Security on TechRepublic It’s not necessary to spend a great deal of time or money to learn the skills required to work in some of the most exciting and highly paid positions in the…
Microsoft warns of new supply chain attacks by Russian-backed Nobelium group
This article has been indexed from Security on TechRepublic The cybercrime group behind the SolarWinds hack remains focused on the global IT supply chain, says Microsoft, with 140 resellers and service providers targeted since May. Read the original article: Microsoft…
You definitely don’t want to play: Squid Game-themed malware is here
This article has been indexed from Security on TechRepublic The stakes may not be as high as in the hit Netflix show, but you could still lose your data or identity if you fail to follow the rules for dodging…
Phishing attack exploits Craigslist and Microsoft OneDrive
This article has been indexed from Security on TechRepublic A phishing campaign took advantage of the mail relay function on Craigslist, which allows attackers to remain anonymous, Inky says. Read the original article: Phishing attack exploits Craigslist and Microsoft OneDrive
9 key security threats that organizations will face in 2022
This article has been indexed from Security on TechRepublic Supply chain attacks, misinformation campaigns, mobile malware and larger scale data breaches are just some of the threats to watch for next year, Check Point Software says. Read the original article:…
REvil ransomware group reportedly taken offline by multi-nation effort
This article has been indexed from Security on TechRepublic Law enforcement officials and cyber specialists hacked into REvil’s network, gaining control of some of its servers, sources told Reuters. Read the original article: REvil ransomware group reportedly taken offline by…
Companies that pay ransomware attackers get thumbs down from consumers
This article has been indexed from Security on TechRepublic More than half of those surveyed by data management firm Cohesity said that companies that pay the ransom in an attack encourage ransomware and bad actors. Read the original article: Companies…
What to do if your small business is a victim of a cyberattack
This article has been indexed from Security on TechRepublic Immersed in the throes of a cyberattack is not the time to figure out how to respond. An expert offers suggestions on how to create a company-specific incident-response plan. Read the…
Train to qualify for elite positions in the high-demand field of cybersecurity
This article has been indexed from Security on TechRepublic You don’t have to go back to school or blow your budget to train for a career in cybersecurity, which is in high demand right now. Read the original article: Train…
How IT pros can set boundaries and protocols
This article has been indexed from Security on TechRepublic From managing backups and Linux distributions to troubleshooting hard drive failure and protecting company data, it’s easy to see why IT pros are overwhelmed and overworked. Read the original article: How…
How to digitally sign email in Apple Mail
This article has been indexed from Security on TechRepublic Adding a digital signature to your email is just one simple step you can take in your journey for more secure communications. Jack Wallen shows you how this is done in…
Microsoft bought CloudKnox because hybrid multicloud identity is complicated
This article has been indexed from Security on TechRepublic Managing passwords and privileged access is bad enough for people—but that’s going to be dwarfed by the problem of dealing with non-human identities. Read the original article: Microsoft bought CloudKnox because…
How to keep your data off the Dark Web
This article has been indexed from Security on TechRepublic Traditional security solutions are no longer enough to protect your organization from a data breach, Bitglass says. Read the original article: How to keep your data off the Dark Web
How to proactively detect and prevent ransomware attacks
This article has been indexed from Security on TechRepublic Two out of three organizations surveyed by ThycoticCentrify were hit by a ransomware attack over the past 12 months, and more than 80% reportedly opted to pay the ransom. Read the…
Aruba introduces the industry’s first distributed services switch
This article has been indexed from Security on TechRepublic The new CX 10000 integrates security services, like a firewall, directly into a one-unit network switch deployable anywhere security and other services need to reside. Read the original article: Aruba introduces…
Tech support scams top list of latest phishing threats
This article has been indexed from Security on TechRepublic Tech support scams work because they try to trick people into believing there’s a serious security crisis with their computers, says Norton Labs. Read the original article: Tech support scams top…
Gartner analyst: 12 technologies to accelerate growth, engineer trust and sculpt change in 2022
This article has been indexed from Security on TechRepublic CIOs must prioritize the same business imperatives and find the IT force multipliers to enable growth and innovation, according to a Gartner analyst during Gartner’s IT Symposium. Read the original article:…
Top 5 tips for dealing with supply-chain disruptions
This article has been indexed from Security on TechRepublic Weather events and port issues have caused major disruptions in the global supply chain. Tom Merritt gives us five ways to deal with it. Read the original article: Top 5 tips…
How to deal with supply-chain disruptions: 5 tips
This article has been indexed from Security on TechRepublic Tom Merritt gives us five ways to deal with the uncertainty of weather events and port issues. Read the original article: How to deal with supply-chain disruptions: 5 tips
Is your organization safe from a cybersecurity attack?
This article has been indexed from Security on TechRepublic How is your company preventing the terror of a potential cybersecurity breach? Take this quick, multiple choice survey and tell us about it. Read the original article: Is your organization safe…
Cybersecurity Awareness Month: Why haven’t you updated your security policies?
This article has been indexed from Security on TechRepublic While you’re sipping that pumpkin spice latte, make sure to review your company’s cybersecurity policies. Read the original article: Cybersecurity Awareness Month: Why haven’t you updated your security policies?
How to use DocSecrets to encrypt sections of your Google Docs
This article has been indexed from Security on TechRepublic If you need to hide sections of text in Google Documents, give the handy DocSecrets add-on a try. Read the original article: How to use DocSecrets to encrypt sections of your…
The White House holds an international summit on ransomware: What you should know
This article has been indexed from Security on TechRepublic This week the White House held a summit with various nations to address the threat of ransomware. Learn some of the takeaways and why certain nations were excluded. Read the original…
Data center admins: Learn how to run a basic vulnerability scan on your Linux servers with Nessus
This article has been indexed from Security on TechRepublic Make sure the Linux servers in your data center are free from vulnerabilities by scanning them immediately using Nessus. Read the original article: Data center admins: Learn how to run a…
How a vishing attack spoofed Microsoft to try to gain remote access
This article has been indexed from Security on TechRepublic A voice phishing campaign spotted by Armorblox tried to convince people to give the attackers access to their computer. Read the original article: How a vishing attack spoofed Microsoft to try…
Broadcom Software’s Symantec Threat Hunter Team discovers first-of-its-kind ransomware
This article has been indexed from Security on TechRepublic The new ransomware family, called Yanluowang, appears to still be under development and lacks some sophisticated features found in similar code. Nonetheless, Symantec said, it’s dangerous. Read the original article: Broadcom…
How to configure SSH to use a non-standard port with SELinux set to enforcing
This article has been indexed from Security on TechRepublic Switching the SSH listening port is an easy way to help secure remote login on your Linux servers. But when SELinux is involved, you have to take a few extra steps.…
3 risk management priorities CIOs are focused on right now
This article has been indexed from Security on TechRepublic CIOs have had their hands full since the start of the pandemic with three risk management and governance priorities weighing heavily on their minds. Read the original article: 3 risk management…
Has COVID-19 or supply chain issues affected your organization’s cybersecurity plans?
This article has been indexed from Security on TechRepublic What do you really think about your company’s cybersecurity strategy? Take this quick, multiple choice survey and tell us. Read the original article: Has COVID-19 or supply chain issues affected your…