The last two years have introduced new challenges to organizations across the globe -- from managing business operations through an ongoing pandemic; to a rapid-fire pivot to a digital mode of work; to an increase in cyber attacks targeting businesses directly, and through their supply chains.
When teams have been able to adapt and act quickly, we’ve seen them survive or even thrive — and not just from a cyber risk standpoint; when teams have struggled to keep pace with change… well, success has been a bit harder to come by.
Some challenges may seem independent from one another but they’re actually reinforcing other trends. Here’s what we mean: the pandemic forced rapid digital transformation, this rapid digital transformation created new attack vectors for bad actors to take advantage of across the digital supply chain, and because those ransomware attacks have been profitable, they continue to be the weapon of choice.
Security and vendor risk professionals are fighting now more than ever to find data solutions that properly identify potential ransomware threats. At BitSight, the top questions we keep hearing are:
1) What can we actually do to prevent ransomware attacks on my organization?
2) What can I do as a third party risk or vendor risk leader to make sure we don’t fall victim to disruption or data loss via a third party attack?
Let’s start with the first question.
BitSight Research reveals data correlations that prove you can reduce the likelihood of experiencing a ransomware attack with:
This guidance is highly logical, but it’s also borne out in the data. Comparing security performance and security practices with actual, publicly disclosed ransomware events, we see the lower a company’s security rating, the more likely they are to suffer a ransomware attack. In fact, companies with a rating between 300 and 500 (falling on the low end of the scale) are almost 8 times as likely to experience ransomware activity as a company with a rating of 750 or above.
We see a similar trend for Patch management -- BitSight measures an organization’s “patching cadence” by looking at the presence and duration of vulnerabilities observed on a company’s infrastructure. Poor performance on the patch management front is highly correlated with ransomware risk.
Organizations with a Patching Cadence grade of D or F were more than 7 times more likely to experience a ransomware event compared to those with an A grade. Again, these are logical findings that make sense intuitively, but they also reinforce the fact that improving there’s work to be done by companies and third party risk teams to help avoid exposure to ransomware attacks.
There’s no denying that third party and vendor risk teams face a challenge of scale. It’s hard to scale with the pace of the business, the number of vendors, the rate of cyber risk change across the third party ecosystem. And it’s often difficult to take the good advice you have for one organization (where you have some amount of control) and apply it to tens or hundreds or even thousands of vendors where you are operating at an arm’s length.
So what can we do to have an impact? What can we do to mitigate the risk of ransomware across third parties? Here are a few places we can start:
The pace of change in third party cyber risk over the last two years has been dizzying, and the stakes are perhaps higher than they’ve ever been. While the problem space here is complicated, the signs are fairly clear: a strong, consistent security program and an effective patch management discipline are critical to mitigating risk against ransomware attacks -- and applying that guidance to your third parties at scale requires cyber risk intelligence embedded in your program, an effective framework for prioritizing effort against risk, and a collaborative approach that drives mutual resilience.
© 2026 BitSight Technologies. All Rights Reserved. | Privacy Policy | Security | For Suppliers
Contact Us | BitSight Technologies | 111 Huntington Ave, Suite 2010, Boston, MA 02199 | +1-617-245-0469