<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1175921925807459&amp;ev=PageView&amp;noscript=1">
Vendor Risk Management

Expect The Unexpected: Which Non-Obvious Vendors Have Access To Your Data?

Melissa Stevens | September 17, 2015

There are obvious and non-obvious vendors, third parties, and contractors that have access to your data or your corporate network. The obvious ones are organizations that provide IT or technology services to you. Naturally, these individuals would have access to your data, because you’ve granted it!

On the flip side, there are plenty of organizations whose access to your corporate network or data is less obvious, or even hidden. These companies likely provide a business service to your organization, which may include law firms, accounting firms, benefits, or PR agencies. Those firms may have access to your sensitive information, and you may be completely unaware. This can be for many reasons. Consider these common situations:

  • You’ve contracted a business service and have given them more network access than you realized.
  • You’ve sent something out to them, like an email or USB, that may have contained sensitive trade information or personally identifiable information (PII).
  • You’ve brought them onsite and have unknowingly allowed them to amass sensitive data on you through simple conversations or onsite visits.

You may not consider these circumstances very important in regards to cyber security—but you should! If you’re providing “hidden” vendors with unprecedented levels of access to your corporate infrastructure, they can do major damage.

Consider These Scenarios

Let’s imagine that your company has just moved into two floors of a brand new office building. Every day, there are hundreds (or thousands) of people coming in and out of the doors. Some of those people you will know, and others you will not. Now let’s say the owners of the office building contract a third party HVAC service, and they give that service provider access to monitor the building facilities remotely. Sounds like business as usual, right?

Download Guide: 5 Ways Vendor Risk Management Programs Leave You In The Dark

Well, what you don’t necessarily know is whether that HVAC company could unintentionally (or intentionally, depending on the circumstance) gain access to your data and corporate infrastructure through your shared internet connection in the building. Now, that’s not to say that you should quickly seek out your building manager and find out whether there’s an HVAC vendor hacking your system. Our point is to simply illustrate how hidden dangers with respect to cyber security aren’t as cut and dry as you might think.

A real life example comes from an unfortunate hack this year involving three web-based press release distribution companies. Several hackers and a handful of investors teamed up to steal press releases before they went public. Using this information, they invested in the companies with major upcoming announcements, resulting in illegal profits of over $100 million. So even though the PR sites were hacked, it was the companies who used these business’ services who paid the price.

Important Steps To Take Today

Being able to constructively manage cyber risk—whether it’s obvious or hidden—is a skill every business should practice. A lot of organizations are focused solely on managing their IT vendors, with hopes that those efforts encompass all security risks. But that approach simply isn’t comprehensive enough; you must look at other business services as well. It is quite likely that they either have data which you’ve provided to them, or they have data that you don’t know about—either way, they likely have access, and it needs to be controlled.

So, what steps can you take to help?

  1. Identify organizations and people who have access to your sensitive data or corporate network. Before you start managing the risk, you need to find out which business services do have access to your data or network. There are plenty of organizations that you haven’t thought about, and those are major vulnerabilities.
  2. Develop a vendor risk management (VRM) program. This process involves quite a bit of time and energy, but strong third party security cannot be understated. If your VRM program isn’t fully optimized, don’t be afraid to ask questions.
  3. Reduce the amount and level of access as best you can. To protect the data that is most important to you and your company—your “crown jewels”—you’ll need to ensure that there is only a small number of individuals who have limited access to your data and network.
  4. Implement industry-standard vendor risk assessment methodologies, including risk assessments, questionnaires, on-site visits, technical scans, and security documentation reviews. You don’t need to reinvent the wheel to adequately measure and monitor risk.
  5. Use a continuous monitoring solution in order to “get the full picture”. By doing this, you’ll be able to effectively monitor the cyber security of all obvious and non-obvious vendors, 365 days a year.


If you’ve read through this article and thought, “Oops! We trust too many organizations with our data...”, or “Have we provided our third parties with access to our corporate infrastructure without knowing it?”, don’t worry. This is a great step in the right direction. We encourage you to keep thinking very broadly about vendor risk management, and the steps you should be taking to ensure that your data is always secure.

Download Guide: 5 Ways Vendor Risk Management Programs Leave You In The Dark (& What You Can Do About It)

Download Guide: 5 Ways Vendor Risk Management Programs Leave You In The Dark We've drilled down into areas that vendor risk management programs leave a little vague. 

Download the guide to see if you've considered these critical areas of vendor risk management.


Suggested Posts

Worthwhile TPRM Certifications for Security & Risk Professionals

As the importance of third-party risk management (TPRM) continues to grow, organizations are hiring for related roles more seriously than ever before. To compensate, security and risk professionals are seeking out certification programs in...


Which Third-Party Risk Management Tools Do You Really Need?

With high-profile breaches being traced back to supply chain vulnerabilities and a regulatory environment that’s waking up to the realities of vendor risk, many organizations are investing heavily in third-party risk management (TPRM)...


New Study: Organizations Struggle to Manage Cyber Risk in Their Supply Chains

A new report from McKinsey & Company sheds light on something we’ve known for many years – organizations are struggling to make significant progress in managing cybersecurity risk in their supply chains.


Subscribe to get security news and updates in your inbox.