Risky Business Services: Who’s Accessing Your Corporate Data?

Noah Simon | August 19, 2015 | tag: Vendor Risk Management

When most people think about mitigating cyber risk from their business service providers, they usually think of their banks, IT service providers, or their software manufacturers.

Download Guide: 5 Ways Vendor Risk Management Programs Leave You In The Dark However, in this infographic we’ve explored the security performance of Law, Accounting, Public Relations, and Benefits Administration firms -- services that are frequently used, but less acknowledged as sources of cyber risk. We’ve recently explained why these sectors are so crucial to monitor: they hold sensitive data on company earnings, trade secrets, and personally identifiable information (PII) on employees and customers. The recent data breaches of prominent newswires is a perfect illustration of what can happen when the cyber performance of third parties holding sensitive information is overlooked. In this breach, hackers accessed nonpublic information which resulted in more than $100 million in profitable trades.

See the infographic below to see how these sectors compare and register for this webinar to learn more:

BizSvcsInfographicweb

Click here to download the full infographic. 

 

DOWNLOAD GUIDE: 5 WAYS VENDOR RISK MANAGEMENT PROGRAMS LEAVE YOU IN THE DARK (& WHAT YOU CAN DO ABOUT IT)

Download Guide: 5 Ways Vendor Risk Management Programs Leave You In The Dark We've drilled down into areas that vendor risk management programs leave a little vague. 

Download the guide to see if you've considered these critical areas of vendor risk management.

 

Suggested Posts

5 Vendor Evaluation Tools to Add to Your Cyber Risk Management Toolkit

Data breaches that originate through third parties are more commonplace than organizations are used to. The SolarWinds hack and Kaseya ransomware attack are two recent examples of threat actors exploiting the security practices of...

READ MORE »

BitSight Integrates With ServiceNow to Reduce Risk Throughout Vendor Management Programs

Organizations rely on third-parties to keep competitive in the marketplace. The EY global third-party risk management survey highlights that in 2019–20, over 33% of the 246 global companies surveyed were managing and monitoring third-party...

READ MORE »

5 Best Practices for Conducting Cyber Security Assessments

Third parties are essential to helping your business grow and stay competitive. But if you’re not careful, your trusted partnerships can introduce unwanted cyber risk and overhead into your organization.

READ MORE »

Get the Weekly Cybersecurity Newsletter.