Making a vendor risk assessment for supply chain attacks
Because of how sophisticated cybercriminals have become, to protect your company’s money and data, it may be wise to make risk assessments of your vendors’ security protocols. This is especially true for new business relationships you may have entered because of a supply chain crunch.
Hackers launch supply chain attacks by exploiting vulnerabilities in a third-party vendor’s network or software. One example of this is the SolarWinds attack that impacted thousands of companies’ networks.
Because vendors often need access to sensitive data to integrate with their customers’ payment systems, if that data gets compromised, multiple organizations in the vendor’s network could then be open to attack – including your firm.
And even if you aren’t directly targeted by a cyberattack, you could still financially be impacted by a supply chain attack.
Another reason to create vendor risk assessments: Unless it’s spelled out in a contract, it’s possible you could share the liability if a data breach occurs. While it’s important that your suppliers feel like you trust them, there’s no harm in checking that they’re keeping their systems secure and that they have a plan for addressing any security gaps.
To ensure there isn’t any undue risk to your network, here’s a checklist of items to watch for suggested by experts.
Conducting a vendor risk assessment
To protect your business (and your suppliers, too), you’ll want to know if your vendors:
- have a written network security policy
- have a process for keeping security patches up to date
- have a process for identifying, evaluating and reporting security vulnerabilities in their network, systems or applications
- use a VPN
- use encryption during storage and transmission of sensitive data
- have controls to prevent and detect unauthorized network access
- log and limit access to systems, applications and data
- have controls for preventing email spoofing, along with ransomware and malware attacks
- backup their data (find out how it’s stored), and
- have a written incident response plan for data breaches, including a plan for recovery of operations.
Based on these criteria, if a vendor seems lax about cybersecurity or if it refuses to provide information about security controls, it may be time to start exploring alternative vendors.
Free Training & Resources
White Papers
Provided by Personify Health
White Papers
Provided by Anaplan
Further Reading
The Federal Trade Commission (FTC) just widened its crackdown of so-called junk fees that mislead the buying public. A proposed rule would ...
Congress created the Securities and Exchange Commission (SEC) to protect investors from market manipulation following the 1929 stock market...
It’s not too late to get tax relief in the form of the Employee Retention Credit that was created as part of the CARES Act in 2020, t...
The list of fraudulent brokerages, securities firms and even financial regulators just keeps getting longer. Hundreds, potentially thousand...
As the U.S. economy navigates the fiscal landscape of 2026, a significant financial gap has emerged between labor segments. A recent survey...
Crooks have more tactics for committing payment fraud at their disposal than you think. For example, these are just the different types ...