“…This assertion supports (Boiko et al, 2019) where the researchers found that end-suppliers, subcontractors, third-party personnel underestimate the risk cyber vulnerabilities associated with loopholes in their corporate network, cloud, and end-device infrastructure; as a result, some personnel will connect various Internet of Things (IoT) devices to their organization's dynamic network infrastructure. Security managers struggle to identify cyber warnings from connected IoT devices and consequently, the responsible employee in the case of an attack on IoT devices (Boiko et al, 2019). Colicchia et al (2019) stated that cybersecurity non-compliant behaviors are deliberate choices that could lead to underestimating the consequences of actions on the supply chain, with oblivious victims of a cyber-attack.…”