Cybersecurity events can include anything from data breaches and zero-day exploits, to phishing and ransomware attacks, which can affect both your organization and your third-party vendor. To protect against various cybersecurity attacks, organizations need to ensure that their vendors maintain documented policies covering areas such as data classification, media sanitization, multi-factor authentication and logical access. Let’s explore some tips on how to manage third-party cybersecurity risk.
Common Threats That Can Impact Cybersecurity Risk
Privilege Abuse
When individuals are given more access privileges than what is needed for their job description (either intentionally or unintentionally), there’s a risk of privilege abuse. A user with too much access could potentially mishandle a sensitive document, further sharing it with other individuals outside of the organization.
How to manage: Make sure that your third-party vendor understands and implements the concept of least privilege. This idea means that a user should only have access when needed for the job task and removing the access once complete. Separating duties for sensitive tasks and requiring access requests and multi-level approvals are also best practices in the concept of least privilege.
Unsecured Data
Sensitive information that isn’t properly secured and protected can be at risk for intentional or unintentional data breaches. When data is intentionally sought out by hackers to be stolen, it can often be resold on the dark web, modified, destroyed, used for fraud and identity theft or held for ransom.
How to manage: Protecting sensitive data is a key principle in cybersecurity and can be accomplished through several different practices such as regular patching and penetration testing, ongoing monitoring, using anti-malware software and encrypting data at rest and in transit. All these practices should be outlined in your vendor’s documented policies to ensure they’re taking the appropriate steps to protect your sensitive data. Your third-party vendor should understand where they have vulnerabilities that may be exploited so they can be proactive in repairing them.
User Errors
Various studies have shown that human error accounts for most data breaches. Mistakes can arise from either lack of skills or poor decision making and it’s important to note that your vendors may even put your organization at more risk if they aren’t held to the same standards as your employees regarding areas like logical access management. Accidentally downloading malware through phishing scams or using weak passwords for remote access are just some of the ways in which your third-party’s employees can put your organization at risk.
How to manage: Of course, it isn’t possible to eliminate all human error, but there are practical steps to take to ensure that mistakes are greatly reduced. To reduce the risk of weak passwords for remote access, you could require the implementation of multi-factor authentication. Specific employee awareness training, like phishing exercises, can also be required of your vendors to address this area of third-party cybersecurity risk.
Responding to an Incident
Prevention is key when managing cybersecurity risk, but it’s also important to understand what to do if your third-party vendor has an incident. Consider the following data breach notification requirements which should be outlined in your vendor contract:
- Timeframe: Specify how quickly your vendor needs to notify your organization of an incident and any penalties that may result if that timeline isn’t met.
- Point of contact: Your vendor should identify a person or persons who can provide your organization with details and updates about the data breach.
- Necessary actions: Clearly define how your vendor should respond to the incident with regards to investigating the cause and any remediation efforts. Also make sure to define how the vendor should prevent future incidents.
- Repercussions: It’s important to include details of any vendor repercussions that may arise after a data breach. This may include a suspension or termination of contract.
In today’s highly digital and interconnected business environment, it’s important to stay on top of cybersecurity risk. A successful third-party management program will ensure that your vendors are taking the proper steps to protect your sensitive data from cybersecurity risks.