Some IT vendors (especially startups) focus on feature/functionality rather than security when they develop products resulting in buggy vulnerable products. Hardware vendors unknowingly build systems using malicious components sourced through their own supply chain. IT products are also often purchased through global networks of third-party distributors that have ample opportunity to turn innocent IT products into malicious confederates for cybercrime. ESG investigated the cyber supply chain security practices of U.S.-based critical infrastructure organizations designated by the Department of Homeland Security.”]

