Risky Business Services: Who’s Accessing Your Corporate Data?

Noah Simon | August 19, 2015 | tag: Vendor Risk Management

When most people think about mitigating cyber risk from their business service providers, they usually think of their banks, IT service providers, or their software manufacturers.

Download Guide: 5 Ways Vendor Risk Management Programs Leave You In The Dark However, in this infographic we’ve explored the security performance of Law, Accounting, Public Relations, and Benefits Administration firms -- services that are frequently used, but less acknowledged as sources of cyber risk. We’ve recently explained why these sectors are so crucial to monitor: they hold sensitive data on company earnings, trade secrets, and personally identifiable information (PII) on employees and customers. The recent data breaches of prominent newswires is a perfect illustration of what can happen when the cyber performance of third parties holding sensitive information is overlooked. In this breach, hackers accessed nonpublic information which resulted in more than $100 million in profitable trades.

See the infographic below to see how these sectors compare and register for this webinar to learn more:

BizSvcsInfographicweb

Click here to download the full infographic. 

 

DOWNLOAD GUIDE: 5 WAYS VENDOR RISK MANAGEMENT PROGRAMS LEAVE YOU IN THE DARK (& WHAT YOU CAN DO ABOUT IT)

Download Guide: 5 Ways Vendor Risk Management Programs Leave You In The Dark We've drilled down into areas that vendor risk management programs leave a little vague. 

Download the guide to see if you've considered these critical areas of vendor risk management.

 

Suggested Posts

5 Tips to Improve Cyber Security Monitoring of Your Vendors

What’s the biggest struggle your vendor risk managers face when establishing cyber security monitoring processes? From sudden increases in the use of third-parties by your organization, to not knowing which vendors might be impacted by the...

READ MORE »

Can Your Vendor Assessments Be More Efficient?

If you’re using a “one-size fits all” approach to managing your vendor lifecycle, you are missing opportunities to save money and operate more efficiently. Vendor management efficiencies don’t end in the onboarding stage: using a...

READ MORE »

Do You Have The Right Vendor Management Policies?

If you’re experiencing frustrating delays and procedural roadblocks during your vendor management process, you’re not alone. Security managers are seeing an increase in the number of third-parties integrating with their business, and ...

READ MORE »

Subscribe to get security news and updates in your inbox.