Making a vendor risk assessment for supply chain attacks
Because of how sophisticated cybercriminals have become, to protect your company’s money and data, it may be wise to make risk assessments of your vendors’ security protocols. This is especially true for new business relationships you may have entered because of a supply chain crunch.
Hackers launch supply chain attacks by exploiting vulnerabilities in a third-party vendor’s network or software. One example of this is the SolarWinds attack that impacted thousands of companies’ networks.
Because vendors often need access to sensitive data to integrate with their customers’ payment systems, if that data gets compromised, multiple organizations in the vendor’s network could then be open to attack – including your firm.
And even if you aren’t directly targeted by a cyberattack, you could still financially be impacted by a supply chain attack.
Another reason to create vendor risk assessments: Unless it’s spelled out in a contract, it’s possible you could share the liability if a data breach occurs. While it’s important that your suppliers feel like you trust them, there’s no harm in checking that they’re keeping their systems secure and that they have a plan for addressing any security gaps.
To ensure there isn’t any undue risk to your network, here’s a checklist of items to watch for suggested by experts.
Conducting a vendor risk assessment
To protect your business (and your suppliers, too), you’ll want to know if your vendors:
- have a written network security policy
- have a process for keeping security patches up to date
- have a process for identifying, evaluating and reporting security vulnerabilities in their network, systems or applications
- use a VPN
- use encryption during storage and transmission of sensitive data
- have controls to prevent and detect unauthorized network access
- log and limit access to systems, applications and data
- have controls for preventing email spoofing, along with ransomware and malware attacks
- backup their data (find out how it’s stored), and
- have a written incident response plan for data breaches, including a plan for recovery of operations.
Based on these criteria, if a vendor seems lax about cybersecurity or if it refuses to provide information about security controls, it may be time to start exploring alternative vendors.
Free Training & Resources
Webinars
Provided by Yooz
White Papers
Provided by Anaplan
White Papers
Provided by Anaplan
Further Reading
That familiar voice on the phone? Could be a deepfake. The face you’ve seen a thousand times in meetings? Don’t assume it’...
The Federal Trade Commission (FTC) managed to stall some major corporate mergers on anti-trust grounds. Don’t be shocked if the trend...
Back in 2013, the Securities & Exchange Commission (SEC) accused hedge fund manager George Jarkesy of defrauding two investors. Unlike ...
HR tech demos rarely stall because the use case is weak. Often, they stall once the review reaches Finance. What should be a straightforwar...
Federal shutdown headlines dominate business coverage, but finance teams are focused on the practical fallout – revising project schedule...
What experts are saying the top business finance trends will be for the upcoming year may sound familiar. They’re worth highlighti...