Third-party vendors are a necessary part of nearly every business. Outsourced operations, from IT to finance, can help increase operational efficiency but can also introduce vulnerabilities into your organization. Scrutiny is key when hiring and maintaining a business...
Cloud computing and coronavirus are among the most consequential forces impacting cybersecurity today. Together, they have created an “endpoint explosion.” Yesterday’s periodic measures are important; however, the only way to manage today’s cyber risks is with a...
2020 is a year that brought many organizations to a fast and hard reality regarding their business operations and the need to support the digitally enabled, remote workforce. Tactically, this meant businesses of all types had to make the transition from a...
2020 was a year of unpredictability and uncertainty. We knew in January that things might change after November’s election, but no one could have predicted the instability of our world by March as a result of COVID-19. Nearly every organization was impacted in terms...
Before your vendor uses software from a third party, what process do they go through to ensure any known vulnerabilities are resolved before it is accepted for use and after it has been deployed? Complex products tend to generate millions of lines of computer code;...
If auditors or examiners are requesting information on your vendors’ vendors, also known as fourth-party vendors, you may need to pump the brakes on your vendor risk management (VRM) program. Some VRM programs address only your immediate vendors (third-party vendors)...