Mistake #3: Not Re-evaluating Your Vendors
Evaluating vendor products and services on a schedule is a difficult yet imperative practice to implement. You need the right vendor evaluation tool.
Evaluating vendor products and services on a schedule is a difficult yet imperative practice to implement. You need the right vendor evaluation tool.
Vendor risk evaluation is an expensive afterthought. 73% of organizations have no direct communication channel between the security program and management responsible for contracts and procurement. Security, whether intentional or not, is effectively an afterthought. This results in a huge business process gap — and a fundamental mistake — that is very common.
The first and most fundamental mistake most organizations make in managing vendor risk is not maintaining a comprehensive list of active vendors. This may strike you as so obvious that it seems silly to note at all, much less cite as mistake number one. However, you will be surprised to learn that “nearly two-thirds of IT security professionals surveyed stated that their organizations do not maintain a comprehensive list of third-party vendors and dependencies.”
Dependence on vendors in your delivery of services or products is a common and necessary part of doing business effectively and efficiently in the 21st century. DoorDash is not alone in relying heavily on third party vendors to deliver their service. Some details about this breach incident recently in the news may surprise you. Other details illuminate how to avoid six common mistakes made by organizations who handle sensitive data.
The main purpose of any organization’s Software/Systems Development Life Cycle (SDLC) plan is to outline the process it employs to design, develop, test, implement, and maintain high-quality software applications and systems with the goal to meet or exceed customer expectations. If you ever are asked to evaluate an organization’s (SDLC) plan, or to compose or […]
There are a number of fundamental habits and disciplines you need to adopt for cybersecurity. Right at the top is having an automated, or semi-automated, system for patches and backups. The more systematic and automated you can make this process, the better. However, be careful. Always provide plenty of checks and balances in place to […]
When you plan to keep information secure, you naturally begin to consider limiting access to the information. In fact, you can keep information secure if you just eliminate all access! However, the information system itself would be considered non-functional in this case. Instead, you need to allow the proper people the appropriate level of access […]
Protecting data integrity means assuring the accuracy and reliability of data during its immediate involvement in processing, as well as over its longer term lifecycle. It must be accounted for in the design, implementation, and usage of data in any system by implementing controls for data’s validity in processing, transit, and storage. The number and […]
Baltimore city government revealed Tuesday its network had been infected by a ransomware attack for the second time in a year, according to a Baltimore Sun article. Lester Davis, spokesman for the Mayor, said that critical systems, including 911 and 311, were not affected, but that the majority of city servers were shut down. The […]
CBS on its show “60 Minutes” this week devoted a couple of segments to the growing problem of ransomware in healthcare. In one segment, they interviewed two cybersecurity experts, and one hospital CEO who recently lived through a ransomware attack, to learn some fundamental tips. Every healthcare CIO, CTO, or IT Director should review these […]