
Dec 22, 2020
3 min read
5 Key Considerations for Third-Party Risk Monitoring
Companies are finally understanding the importance of having a full due diligence process in place to assess their third-party vendors. But an essential part of the third-party risk management process is what happens at the end: Once you’ve finished assessing your vendors; you need to monitor them. This proactive approach will alert you of any potential or new risks that...

Dec 09, 2020
2 min read
5 Key Steps to Include in Your Vendor Risk Assessment
With increasing dependence on vendors in today’s interconnected world, vendor risk assessments are more essential than ever. No doubt, due to COVID-19, many companies took shortcuts with their security just to continue with “business as usual” during these unprecedented times. Simultaneously, however, cybercriminals were taking advantage of the situation, as is apparent by the growing intensity and frequency of cyberattacks...

Nov 24, 2020
1 min read
How Improved Vendor Collaboration and Communication Can Actually Reduce Cyber Risk
Remember when “Telephone” referenced a game you played with your childhood friends? “Telephone” in the workplace, especially between you and your vendors, is anything but fun and games. It is the cause of much frustration, inefficiencies and unnecessary risk to your organization. In recent years, businesses have greatly increased their reliance on vendors. Ideally, working with vendors enables businesses to...

Nov 12, 2020
3 min read
4 Reasons You Should Perform a Third-Party Cyber Risk Assessment
What do Instagram, Marriot and General Electric have in common? All three experienced third-party vendor data breaches in 2020. It’s pretty much impossible to find a company today that is not reliant on third-party vendors for products or services. Vendors offer organizations the ability to reduce costs and improve efficiency. Unfortunately, the same vendors may also carry risk for these...

Oct 14, 2020
2 min read
Securing Your Suppliers: Building the Right Password Policy
Organizations rely on passwords to ensure security. Yet according to Verizon’s 2020 Data Breach Investigations Report (DBIR), over 80% of hacking-related breaches involve the use of lost or stolen credentials. The problem has only gotten worse in the wake of coronavirus, when businesses have been forced to require their employees to work from home. This sudden need for increased remote...

Oct 06, 2020
3 min read
Securing Your Suppliers: Preventing Phishing Attacks
Phishing, which is an attempt to deceive a victim so as to gain access to confidential information and/or distribute infected files, is nothing new. But it’s gotten worse. According to the Verizon Business 2020 Data Breach Investigations Report, phishing was to blame for more than 67% of breaches—but that was before coronavirus. In March, phishing attacks rose 667%, and research...

Jul 28, 2020
4 min read
Third-Party Cyber Risk: 6 Facts Every CISO Should Know
If your organization is like most, then it works with third-party suppliers. Yet not everyone fully comprehends the cyber risk that comes along with doing so, and how serious the problem has become in 2020. A combination of supply chain complexity, increased cloud storage, new data privacy regulations, remote work and rising cyberattacks have created the perfect storm for third-party...

Jul 23, 2020
3 min read
Top 5 Reasons Why Your Supplier Needs a Remediation Plan
Companies want to get down to business quickly, and that includes rapid onboarding of third parties. But often, hiring a new supplier requires a thorough security assessment to ensure that your security policies and standards are supported. What happens when you discover that a supplier you wish to do business with is not as secure as you would like it...

Jul 22, 2020
3 min read
The New Cyber Risk Rating: A Conversation with Panorays’ Chief Architect
Today, Panorays announced its release of the Cyber Risk Rating, a combined “bottom-line” rating of all of the cyber data available about a supplier on Panorays, including the Cyber Posture Rating, Smart Questionnaire™ Rating and business impact. Unique to Panorays, the Cyber Risk Rating enables security professionals to make quick decisions about their suppliers’ security. To shed some light on...

Jun 04, 2020
4 min read
The Top 5 Third-Party Data Breaches of 2020
The year is not even half over, and third-party data breaches continue to proliferate. In third-party data breaches, sensitive information belonging to an organization is compromised through a vendor, business partner or supplier. Such cyber events can be disastrous for organizations, which can lose customer confidence and loyalty and face hefty regulatory penalties. In fact, according to a recent Gartner...
Popular Posts

Feb 10, 2022
1 min read
The Most Common Third-Party Cyber Gaps Revealed
As organizations increasingly rely on third-party vendors to provide essential services, they also become more vulnerable to vendor related cybersecurity risks. A recent study by Forrester found that nearly 60% of companies experienced a data breach due to a third-party vendor in the past year. But what are the most common vendor cyber gaps that organizations should be aware of?...

Aug 26, 2021
3 min read
4 Ways to See if You Are at Risk of a Vendor…
Recent supply chain attacks such as Kaseya, Accellion and SolarWinds have illustrated that when it comes to vendor breaches, it’s not if, but when. While it’s impossible to predict cyberattacks, there are key steps that you can take with your vendors to determine if you might be at risk. Here are 4 key strategies: 1. Monitor security posture It’s important...

Jan 03, 2022
3 min read
5 Resolutions for Reducing Third-Party Cyber Risk in 2022
If there’s one thing we’ve all learned, it’s that supply chain attacks are not going away anytime soon. Last year, we saw major cyber incidents involving Accellion, Kaseya, Codecov and others; next year, there will certainly be more. To help prevent and respond to similar cyber incidents, it’s essential to consider how best to reduce third-party risk. How can this...