When you outsource to a third-party, cybersecurity risk is a huge possibility. The confidentiality of your organization’s and customers’ data is on the verge of being exposed daily as your third parties, just like you, must have comprehensive precautions and plans in place to information from being breached, a phishing attack, malware and more. It’s just the honest truth.
According to the FFIEC, cybersecurity is defined as “The process of protection consumer and bank (organization) information by preventing, detecting, and responding to attacks.”
4 Best Practices to Reduce Third-Party Cybersecurity Risk
This all may be very concerning to hear: the fact that your third party could be the reason you experience a very unanticipated cybersecurity attack. Understandably! But, don’t start scrambling around just yet.
First, let me share some best practices to reduce third-party cybersecurity risk. This should help support your mission to protect both your organization and customers:
1. Verify your third party has implemented strong third-party risk cybersecurity monitoring and plans.
Not only should you request due diligence around your vendor’s cybersecurity protocols and procedures; it’s also extremely important to inquire around security testing. This not only helps ensure their data is secure, it should also confirm if they have an incident detection and response plan. This is a great way to identify weakness in a tangible format.
Your vendor’s reported security testing should include the following:
- Regular, standardized penetration testing of internal and external networks and social engineering testing. Social engineering testing should include things such as simulated phishing emails and employee awareness tests.
- Documented follow up to findings as well as remediation of any issues that were found. You want to make sure that your vendor has demonstrated that they’re testing for weakness, following up on any issues and fixing them timely.
- Documented evidence that security testing is done at least annually. Preferably by an impartial third-party.
Incident detection and response is also crucial. An incident can be anything that affects the confidentiality, integrity or availability of information or an information system. The truth is, Incidents happen — it’s inevitable. The key to minimizing the impact is discovering them quickly and having a plan to address them quickly and effectively.
Here are four questions you’ll want to ask:
- How do your vendors identify an incident?
- Do they have an effective response plan and notification procedure?
- Is your vendor able to demonstrate their process when an incident occurs?
- How is follow up handled (e.g., notification and resolution steps)
2. Confirm your vendors share cybersecurity best practices and provide adequate training to their employees, contractors and even their OWN vendors.
With employee, contractor and vendor management, you must understand the vendor’s ability to ensure their agents are prepared to protect your data. Training for these groups as well as documented and enforced access management are critical to data protection.
Confidentiality agreements, security training, management of vendors and access management are just some of the ways a third party can offer assurance that anyone with access to your data is properly trained.
3. You must ensure data breach notification requirements are documented in your contract language.
Notification timeframes need to be documented as well. Be sure to request the third-party notify you as soon as a breach occurs, or within a specified timeframe. Write it into the contract if you can! Many organizations have shared that there is a high level of mistrust between third parties who may not notify them of a data breach in a timely manner.
4. Set cybersecurity risk expectations and requirements with your vendor.
If a breach originated from the vendor and not your internal organization, then perform deep audit testing. If the vendor is unwilling to cooperate there are larger issues at hand, it may be time to reconsider your partnership.
By taking the necessary precautions and understanding your third party’s cybersecurity posture, you can reduce the risk of your vendors and contractors becoming the weakest link. At the very least, you want to thoroughly review your vendor’s approach to cybersecurity and risk management.
Remember, by failing to properly manage your vendor cybersecurity risk, you could become vulnerable to a breach and the regulatory, reputational and financial consequences that come with it.
If your vendor has suffered a data breach, there are steps you can take! Download the infographic.
