When using dozens, hundreds, even thousands of vendors, how safe is a company’s digital assets? According to a recent Ponemon Institute study, almost half of respondents (49%) said that they had experienced a data breach caused by a vendor that resulted in a loss and misuse of sensitive or confidential information.
Cyber risk — which is the risk of financial loss, disruption or damage to an organization’s reputation from an attack of IT systems — is proving costly to American companies. According to Business Insider, the average cost of a data breach is $6.53 million. The amount gets more staggering when coupled with the previous statistic that almost half of companies report vendor-caused breaches.
“No institution has the resources to completely eliminate cyber risks,” said Leslie Chacko, Evan Sekeris and Claus Herbolzheimer, in a recent article from the Harvard Business Review. “That means helping businesses to make the right strategic choices regarding which threats to mitigate is all the more important. But right now, these decisions are made based on an incomplete understanding of the cost of the various vulnerabilities. Organizations often fail to take into account all of the possible repercussions, and have a weak grasp of how the investments in controls will decrease the probability of a threat. It’s often unclear whether they are stopping a threat or just decreasing its probability — and if so, by how much?”
Three Areas of Cyber Risk
To mitigate cyber risk, a company needs to constantly monitor three distinct areas, both internally and externally:
Continuous Risk Assessment when Selecting Vendors
One way to help measure cyber risk is with a continuous risk assessment tool. Continuous risk assessment allows for ongoing awareness of information security, vulnerability and threats that a company or a vendor may pose. BitSight Security Ratings lets you monitor events, diligence and user behavior in real-time, so threats and warnings are immediate. Other benefits of security ratings include:
Above all, security ratings raises awareness of issues long before traditional solutions, such as audits or checklist assessments, which are typically performed quarterly or annually. For example, if an event such as malware or spam is detected, the vendor’s rating will be downgraded due to their inherent risk, and the company monitoring their BitSight Security Rating solution can be alerted about that vendor’s new security posture.
One way to think about vendor selection using a security rating is to compare it to credit checks. A company might check a credit score of a vendor before doing business to gauge its creditworthiness or financial health. A security rating tells a company how safe or vulnerable that vendor may be regarding cyber risk. So how do you guard against cyber risk when performing the vendor selection process? Security Ratings let you:
BitSight lets companies purchase a one-time security rating report that can be used for assessing cyber risk and vendor selection. For example, a BitSight report will tell you if there is an infection on the vendor’s network and how long it’s been there. If you are looking at a vendor and see the infection has been active for 30 days, that’s a clear red flag that the vendor’s security program may be unacceptable.
Companies may have a cyber risk management program either internally or vendor facing only because they are included in some form of compliance and regulatory program, such as PCI, HIPAA or being audited by the FDIC or other external body. Mapping your continuous monitoring data to standards such as NIST and PCI will become a must in the future as it becomes harder to ascertain the accuracy your vendor’s security posture.
Conclusion
Traditionally, companies dealt with cyber risk because of regulatory requirements and not because of their board mandating them to do so. That certainly still remains true, but more companies are looking for cyber risk solutions because the changing threat landscape dictates it. And that’s what continuous risk assessment does: As cyber risk changes and evolves, your ability to measure the vulnerability of your vendors must evolve as well, and that’s what the BitSight solution does.
For more information about security ratings, visit bitsighttech.com, or download its guide: A Security Manager’s Guide to Vendor Risk Management.
Data breaches that originate through third parties are more commonplace than organizations are used to. The SolarWinds hack and Kaseya ransomware attack are two recent examples of threat actors exploiting the security practices of...
Organizations rely on third-parties to keep competitive in the marketplace. The EY global third-party risk management survey highlights that in 2019–20, over 33% of the 246 global companies surveyed were managing and monitoring third-party...
Third parties are essential to helping your business grow and stay competitive. But if you’re not careful, your trusted partnerships can introduce unwanted cyber risk and overhead into your organization.
© 2026 BitSight Technologies. All Rights Reserved. | Privacy Policy | Security | For Suppliers
Contact Us | BitSight Technologies | 111 Huntington Ave, Suite 2010, Boston, MA 02199 | +1-617-245-0469