For 2020, we decided to get serious about organizing our vendor list

Vendor Risk Assessment Best Practice #3 – Maintain a Comprehensive List

The first and most fundamental mistake most organizations make in managing vendor risk is not maintaining a comprehensive list of active vendors. This may strike you as so obvious that it seems silly to note at all, much less cite as mistake number one. However, you will be surprised to learn that “nearly two-thirds of IT security professionals surveyed stated that their organizations do not maintain a comprehensive list of third-party vendors and dependencies.”

DoorDash Breach – Surprises and Mistakes in Managing Vendor Risk

Dependence on vendors in your delivery of services or products is a common and necessary part of doing business effectively and efficiently in the 21st century. DoorDash is not alone in relying heavily on third party vendors to deliver their service. Some details about this breach incident recently in the news may surprise you. Other details illuminate how to avoid six common mistakes made by organizations who handle sensitive data.

Layered Security

Confidentiality: Concepts, Strategy, and Frameworks

Confidentially, in InfoSec, is the protection of information from unauthorized people and processes. It’s one of the three pillars of InfoSec’s CIA triad, along with integrity and availability. Ensuring confidentiality means taking adequate measures to ensure the protection of the secrecy of data objects, or resources. Note that it does not mean taking every measure […]

Average cost for healthcare organizations for each record involved in breach is $408

Total Cost of a Data Breach Keeps Growing

Interesting facts surface and covered in this report. Includes good points and quotes from people with recent experience about hidden costs that you may not be considering when you think of the impact of a breach. Average cost across all industries for each record involved in breach is $148. Average cost for healthcare organizations for […]