• Login
    • Proximity
    • ClearDB
    • ServiceNow
    • NaviVue
      (Formerly Velocity Zoom)
    • Privo Service Desk
  • Support
  • Contact Us
  • Login
    • Proximity
    • ClearDB
    • ServiceNow
    • NaviVue
      (Formerly Velocity Zoom)
    • Privo Service Desk
  • Support
  • Contact Us
  • Industries
    • Healthcare
    • Life Sciences
    • Manufacturing
    • ISV/SaaS
  • Services
    • Application Services
      • Oracle
      • SAP
        • SAP Analytics
        • SAP Business Technology Platform
        • SAP Data Management Services
        • SAP ECC
        • SAP Intelligent Technologies
        • SAP Managed Services
        • SAP Professional Services
        • SAP S/4HANA
        • RISE with SAP
      • Microsoft
      • Infor
      • Salesforce
      • Custom Application Development
    • Cloud Marketplaces
      • AWS
      • Azure
      • Heroku
    • Cloud Services
      • AWS
      • Google Cloud
      • Microsoft Azure
      • Oracle Cloud
      • Cloud Migration
      • Cloud Optimization
      • Cloud DevOps
      • Virtual Desktops
    • Data Intelligence & Automation
      • Business Intelligence
      • Blockchain
      • CPM
      • Data Architecture & Design
      • Predictive Analytics & AI
      • Robotic Process Automation
      • SAP Analytics
    • Database Services
      • Managed DBA
      • SAP HANA
      • Database Refactoring
      • Database as a Service
    • Infrastructure Services
      • Managed Hosting
      • IBM i Power Systems (AS/400)
      • Colocation
      • Disaster Recovery
    • Security Services
      • Advisory Services
      • Managed Security Services
      • Virtual CISO
    • Supply Chain
  • Resources
    • Blog
    • Resource Center
    • Events
    • Case Studies
  • Partners
    • AWS
    • Google
    • Microsoft
    • Oracle
    • Salesforce
    • SAP
    • ServiceNow
    • Stripe
  • Company
    • About
    • NaviVerse
    • Careers
    • Leadership
    • News
    • Press Releases
    • Awards & Recognition
    • Trust & Transparency
    • #NaviGivesBack
    • Navisite’s Next Steminist
    • Contact

From the Desk of the vCISO: How to Protect Your Business from Third-Party Risk

Aaron Boissonnault
  • All Posts
  • News
  • Events
  • Tips
  • Insights
  • Spotlight
  • Company

Last year, a team of cybercriminals planted malware into a routine software upgrade from a Texas-based IT company called SolarWinds, which provides third-party network management services to more than 300,000 customers. Nearly 18,000 of these customers downloaded the malware-ridden updates embedded in SolarWinds’ product. Once they did, these bad actors were able to access everything from Microsoft to U.S. government agencies.

This SolarWinds breach went down as one of the most sophisticated cybersecurity attacks in history.

Today, organizations of all sizes are increasingly relying on third-party vendors like SolarWinds to outsource key functions and expertise, so they can focus on their core competencies. In doing so, however, they’re exposing themselves to high-profile risks like never before. That’s because when your third-party vendor is breached, your own systems and data can become compromised, too.  

According to the Ponemon Institute’s Data Risk in the Third-Party Ecosystem study, 56% of businesses surveyed confirmed their third-party vendor caused some form of data breach. Additionally, 42% of respondents reported “cyberattacks against third parties resulted in the misuse of their company’s sensitive or confidential information.”

Protecting Your Business from Risks Starts with Understanding Your Full Ecosystem

Most companies spend a tremendous amount of time and money securing their organization, with people, processes and technology usually being the core focus. We implement things like firewalls, endpoint protection, SIEM solutions and end-user awareness training. Many companies, however, stop there.

The reality is, protecting your business requires full visibility—because if you can’t see it, you can’t protect it. It’s hard enough to ensure your business and customer data is secure—but you also need to be vigilant about your entire business ecosystem. That means having a clear understanding of every third-party vendor that services your business—from the people who enter your building to deliver office supplies, to the SaaS company running your applications. Who are your third-party vendors? How does your company interact with them? What access do they have to your data? These are all critical questions you should be asking yourself, because only then can you start building a program to understand the level of risk each supplier poses to your business.

How to Identify and Manage Your Third-Party Vendor Risks

To get control over your entire business ecosystem, start by categorizing your third-party vendors based on the level of risk they present. Make sure you’re properly vetting every single vendor—however big or small. Your work doesn’t stop there, however. You need to continuously monitor each vendor for any security incidents. You also need to be prepared with an action plan in the event that a breach within your supply chain does occur.

But all of these things can be a tall order for businesses. So how can you make sure you’re following the right steps and putting the right processes in place—especially if you’re already facing time and resource constraints?

In working with hundreds of customers, we’ve identified four suggested steps to consider as you evaluate your suppliers.

Do Your Homework: Treat every vendor like they’re a candidate for a new role at your company. You’ll want to spend time evaluating prospective vendors, their history, their policies, their certifications and more. Does their approach to security and compliance align with yours? Do they have best-in-class security frameworks in place like ISO 27001? If this is a vendor that will have physical access to your building, make sure you fully understand who they are, why they need access and when they need it. It’s also important to evaluate the personnel, technologies, verifications and checkpoints you have in place at the building to verify their identities and access privileges. Knowing all of this information will help you categorize each vendor based on the level of risk they present.

Continually Monitor: Security is a moving target. Even after you’ve vetted your vendors, it’s important to keep a close eye on them to both identify any changes to their policies or personnel but to also make sure you’re aware of new security incidents. You don’t want to be the last person to find out about a breach.

Be Prepared: The risk of a potential security incident is never zero—in fact, you should expect it to happen. That’s why having a security incident response plan in place is crucial. Do you have a team ready to respond with defined roles and responsibilities? What security tools do you have in place? How and when will you communicate an incident to key stakeholders? Do you need to report the incident to external authorities? When a security event takes place, time is of the essence. Your ability to remediate a threat depends on how quickly you can act to contain any exposure. You’ll also want to make sure you have a business continuity plan in place in case the breach resulted in critical services being unavailable or offline for a significant amount of time.

Conduct Regular Assessments: Make sure to follow-up with your vendors at least once a year to ensure their security programs and policies continue to evolve and are compliant with your own standards.

Each of these steps plays an important role in your overall business security strategy—but for many, they might feel overwhelming. Fortunately, you have a support system. Managed service providers like Navisite offer services to help you boost your security posture with ongoing threat protection. From assessing the current state of your security to providing ongoing and proactive managed security services, we deliver the security expertise and protection you need using the latest technologies and security controls to catch threats before they cause a disruption to your business.

Learn more about our security services.

You May Also Like

From the Desk of the vCISO: Using Security Frameworks to Build Your Cybersecurity Program

Tips
by Aaron Boissonnault  

How to Choose the Right SAP S/4HANA Implementation Path for Your Business

Tips
by Megan Ferringer  
About the Author
Aaron Boissonnault
Aaron Boissonnault

Aaron is the Chief Information Security Officer at Navisite and is responsible for security and compliance programs and the delivery of our managed security and advisory services to help customers implement and maintain the highest levels of cybersecurity protection and best practices. Aaron has more than 18 years of experience in the industry, holding various leadership and consulting roles in cloud security, infrastructure security and security operations.

Categories

  • Blog
  • Events
  • Insights
  • News
  • Spotlight
  • Tips

About Us

Navisite is a trusted IT services partner for mid-market and smaller enterprise companies. We help our customers maximize business value and accelerate digital transformation with a comprehensive portfolio of enterprise application, data management, security and managed cloud services.

Follow Us & Share

Press Releases

  • Navisite Named a Finalist for 2023 SAP® Pinnacle Award in the Sales Success – Midmarket Category
    April 25, 2023
  • Public Consulting Group’s Education Practice Chooses Digital Transformation Partner Navisite for Public Cloud Migration
    April 18, 2023
  • Navisite Chief Marketing Officer Receives PRNEWS Top Women Award
    April 17, 2023
  • Navisite Launches Third Annual ‘Next Steminist’ Scholarship Program in the U.S.
    April 5, 2023
  • Navisite Announces Key Executive Appointments
    March 29, 2023
  • U.S. Tech Company Navisite Expands Globally with Presence in Costa Rica
    March 9, 2023
How to Choose the Right SAP S/4HANA Implementation Path for Your Business
by Megan Ferringer  
Next Post      

Industries

  • Healthcare
  • Life Sciences
  • Manufacturing
  • ISV/SaaS

Services

  • Application Services
  • Cloud Marketplaces
  • Cloud Services
  • Data Intelligence & Automation
  • Database Services
  • Infrastructure Services
  • Security Services
  • Supply Chain

Resources

  • Blog
  • Resource Center
  • Events
  • Case Studies

Partners

  • AWS
  • Google
  • Microsoft
  • Oracle
  • Salesforce
  • SAP
  • Service Now
  • Stripe

Company

  • About
  • NaviVerse
  • Careers
  • Leadership
  • News
  • Press Releases
  • Awards & Recognition
  • Trust & Transparency
  • #NaviGivesBack
  • Navisite’s Next Steminist Scholarship
  • Contact
  • Modern Slavery
We use cookies
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Cookies
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT