How to protect your computer online against viruses and spyware

Home Cyber Security Computer Security Computer Virus Computer Spyware Computer Privacy Computer Software Internet Security


Corporate Cybersecurity –
the Role of Third-Party Vendors

How to reduce
third-party vendor security risks to your company

When we are talking about corporate cybersecurity, i.e. the security of a certain company's computer system, we usually talk about what companies can do from within. We concentrate on educating employees, updating cyber security measures and staying on top of less talked-about threat vectors such as theft of devices.

In the modern world of business, however, companies also need to worry about dealing with various partners and service providers that may gain access to certain parts of the company's system for business purposes. These entities are usually called third-party vendors and, according to the majority of cybersecurity experts, they constitute a consideration that cannot be ignored.

Padlocked screen seen against the world map

When you run a corporation, you need to adopt cyber security measures for all
potential threat vecorts, including your third-party vendors, who can pose a cyber risk.

Who Can Be Third-Party Vendors

Third-party vendors are all entities (usually other companies) that your company does business with in any capacity. Your suppliers, your outside IT support partners, a marketing agency that you employ either on a permanent basis or for one-off projects, an accounting firm you employ, etc.

In the modern business world, often times these third-party vendors gain temporary access to certain parts of your cyber system. For instance, you might allow a marketing agency to gain access to the server where your website is hosted, from where it is possible to access all kinds of other data that pertains to your company and your customers. When we are talking your outside IT partners, they usually have limitless access to the majority of your company data and systems.

Third-party vendor data breaches are extremely common and according to recent research by Soha Systems, almost two-thirds of all cybersecurity breaches can be traced to third-party vendors.

In a great article from Security Scorecard, you can find descriptions of a number of major third-party vendor breaches from 2016. It provides a great overview of the different ways in which attackers use third-party vendors to access data belonging to some of world's largest companies and organizations.

Protecting Your Company

Protecting your company from third-party vendor-related cybersecurity breaches can be done, but it will require quite a bit of work and meticulous planning and executing.

Beefing up from within

For one, you will want to immediately install a multi-layered strategy that will cover every possible access point to your system – from mobile devices, computers to applications, servers and any other imaginable point of entry.

A huge part of this will be a system of at least two-factor authentication for any and all data and network access requests that come from outside of the company. In other words, every request for access needs to be confirmed by at least two factors, preferably three or more.

You should also immediately start educating everyone in your company and provide guidelines for their behavior when third-party requests are in question. This will involve everyone working for your company, from executives to temp workers.


Assessing all vendors

When deciding to do business with certain third-party vendors, you simply have to insist on being able to assess their cybersecurity measures and practices. This is a costly process and you might find out that certain vendors are not too happy about someone inspecting their practices, but if you want to be as safe as possible, you will do it.

It should be pointed out that this is not a one-off thing and that you will want to continue assessing their cybersecurity solutions throughout your relationship, making sure they are constantly updating their security measures and staying in touch with what is happening in the world of cybersecurity.

Once you are satisfied with how this potential new partner handles their cybersecurity, you should ask them to sign a service-level agreement which will prescribe all of their future practices that can in any way pertain to the way they handle your business and your data. This agreement should cover, among other things, information privacy and security, risk analysis, data access and, equally as important, breach reporting requirements (making sure your vendor informs you the moment they suffer a breach).

Illustration of laptops being connected by a wire to the large globe

If your third-party vendors have access to your corporate data, then your corporate
security can be compromised by their cybersecurity risks and mismanagement.

Open lines of communication

A way to add yet another layer of security to your third-party vendor relationships is to stay in touch with them and their security people. For companies that use intranet, this will be very easy as you will be able to simply include their people in all of your cybersecurity correspondence, making sure they have access to all important guidelines and documents.

You should also ask them to give you regular updates on how they are handling things on their end, whether they are regularly updating their security systems and practices and whether they are noticing any strange things happening.

These open lines of communication will come in particularly handy should they suffer a breach. This way, you will be informed immediately and you will be able to start closing all potential avenues of attack coming from them to your system.

Closing Word

Third-party vendors are an essential part of any corporate cybersecurity ecosystem and you need to remember this at all times. That being said, with some smart practices and extra effort, you can reduce the chances of suffering such a breach dramatically.

Make sure to do it.

  Internet Security for Business
Business Internet Security
Business Internet Security
File Sharing Security
File Sharing Security
Internet Security Issues
Internet Security Issues
Third Party Vendor Security
Third Party Vendor Security
Wireless Hot Spots
Wireless Hot Spots