Cloudibn News

Be updated with Technology

  • BIG Data & Analytics
  • CLOUD
  • Data Center
  • IOT
  • Machine Learning & AI
  • SECURITY
  • Blockchain
  • Virtualization
You are here: Home / Virtualization / Know Who Has the Keys to Your Data

Know Who Has the Keys to Your Data

April 30, 2021 by cbn Leave a Comment

By Shanna Utgard, Cybersecurity Success Manager, Defendify

We’ve seen a significant increase in organizations falling
victim to the latest cyberattack, resulting in a costly trove of compromised business
and customer data. Any breach requires significant time, resources and money to
remediate, not to mention the unintended costs like legal fees and the potential
loss of customer trust and new business opportunities. Recent studies have shown that the
average cost of a data breach to businesses can range from $120,000 to $1.24
million, 
and that’s strictly looking at the non-enterprise market.

How does this happen when organizations are seemingly
following all the right steps to ensure their data is secure? The culprits can
often be the organizations you trust and willingly gave keys to your data: your
partners and vendors.

The Ramifications of Cyber Threats Are Far-Reaching

Cyber threats have grown in sophistication in today’s
increasingly hyper-connected world, so it’s critical to scrutinize all
potential entry points. External partners
and vendors are important to your business, but if left unchecked, they could unintentionally
compromise the security of your data.

In fact, before granting access to your data, you hold
the burden of responsibility to ensure your business partners have healthy
cybersecurity practices in place. Consider, for example, the confidential
documents or files detailing intellectual property (IP) that a law firm might
store about their clients and business partners. Not only could exposing this
type of data have far-reaching consequences, but an undetected cyber breach may
allow bad actors to gain access to other integrated systems, networks, or applications
and cause further damage.

So how can you properly vet your partners and vendors? Start
with a thorough cybersecurity risk assessment.

The Cybersecurity Risk Assessment

Larger enterprises
have been conducting cybersecurity risk assessments on their external partners
and vendors for years, but this is an important practice for organizations of
all sizes. Cyber attackers may use external providers to “island hop”. This
catchy term is a play on the military strategy of World War II where the United
States utilized smaller islands to get to their larger targets. Threat actors
use organizations with less advanced cyber protections to gain access to other
entities. A breach of your systems may lead to infecting a vendor, or your
third-party may cause a breach of your systems. 
From the Target breach to the Solarwinds attack, we continue to be
reminded how important it is to understand the security weaknesses of your
vendors and partners and how they could put your data at risk. 

A cybersecurity risk assessment will require your vendors
and partners to disclose the policies,
procedures, and tools they use to protect data across their organization, and
what potential security gaps could potentially lead to a compromise.

The assessment should include questions about technology
solutions and cloud applications used, data storage and protection methods, employee
cybersecurity training tactics, and data use policies and incident response plans,
company cybersecurity testing processes and more.

defendify-procedures 

This task might
seem daunting to some, but consulting key security frameworks like the NIST Cybersecurity Framework will guide what you should look for. You can
reduce the complexity of assessing the cybersecurity posture of your third-party
providers by using a cybersecurity
assessment tool
. The tool
should map assessment questions to security frameworks like NIST, CIS, HIPAA, or
GDPR. The result should be a detailed report that includes an overall
cybersecurity “grade”, a list of security gaps, and recommended next steps on remediating
vulnerabilities.

Remember, it is
not just your organization’s data you need to be mindful of, but also your
customers’ data. Requiring regular cybersecurity assessments from your external
partners and vendors not only reduces the risk of a breach but can show your customers
and prospects that you go above and beyond to protect their data – a nice potential
value-add that differentiates you from your competition.

##

ABOUT THE AUTHOR

Shanna Utgard, Cybersecurity Success Manager, Defendify

Shanna Utgard 

CRN Women of the Channel winner, Shanna Utgard, has been helping organizations without security teams, including IT service providers, build stronger cybersecurity programs beyond traditional methods. As an accomplished training professional, Shanna frequently speaks on a broad range of cybersecurity topics, from prevention tips to scaling revenue through cybersecurity.

Share on FacebookShare on TwitterShare on LinkedinShare on Pinterest

Filed Under: Virtualization

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • May 2015

Recent Posts

  • T-Mobile’s 5G Advanced Network Solutions Bring Compute to the Edge with Dell Technologies
  • Thoughtworks weighs in on multicloud
  • Sunshine Makes Us Happy
  • Secure Software Supply Chain: Why Every Link Matters
  • VAST Data Answers the Customer Call For More Speed, Scale and Security With Newest Feature Releases

Recent Comments

    Categories

    • Artificial intelligence
    • BIG Data & Analytics
    • BlockChain
    • CLOUD
    • Data Center
    • IOT
    • Machine Learning
    • SECURITY
    • Storage
    • Uncategorized
    • Virtualization

    Categories

    • Artificial intelligence (153)
    • BIG Data & Analytics (192)
    • BlockChain (523)
    • CLOUD (2,270)
    • Data Center (751)
    • IOT (2,940)
    • Machine Learning (249)
    • SECURITY (895)
    • Storage (29)
    • Uncategorized (69)
    • Virtualization (1,538)

    Subscribe Our Newsletter

    0% Complete

    Copyright © 2022 · News Pro Theme on Genesis Framework · WordPress · Log in

    Looking for Cloud Solutions, We can help !

    ×