Software

Gain a 360-degree view of third-party risk by using our SaaS software to centralize, track, automate, assess and report on your vendors. 

Managed Services

Let us handle the manual labor of third-party risk management by collaborating with our experts to reduce the workload and mature your program. 

Overview
Document Collection
Policy/Program Template/Consulting
Virtual Vendor Management Office
Vendor Site Audit

Ongoing Monitoring

Let us handle the manual labor of third-party risk management by collaborating with our experts.

VX LP Sequence USE FOR CORPORATE SITE-thumb
Venminder Exchange

As Venminder completes assessments for clients on new vendors, they are then made available inside the Venminder Exchange for you to preview scores and purchase as you need.

CREATE FREE ACCOUNT

Use Cases

Learn more on how customers are using Venminder to transform their third-party risk management programs. 

Industries

Venminder is used by organizations of all sizes in all industries to mitigate vendor risk and streamline processes

Why Venminder

We focus on the needs of our customers by working closely and creating a collaborative partnership

1.7.2020-what-is-a-third-party-risk-assessment-FEATURED
Sample Vendor Risk Assessments

Venminder experts complete 30,000 vendor risk assessments annually. Download samples to see how outsourcing to Venminder can reduce your workload.

DOWNLOAD SAMPLES

Resources

Trends, best practices and insights to keep you current in your knowledge of third-party risk.

Webinars

Earn CPE credit and stay current on the latest best practices and trends in third-party risk management.  

See Upcoming Webinars

On-Demand Webinars

 

Community

Join a free community dedicated to third-party risk professionals where you can network with your peers. 

Weekly Newsletter

Receive the popular Third Party Thursday newsletter into your inbox every Thursday with the latest and greatest updates.

Subscribe

 

Venminder Samples

Download samples of Venminder's vendor risk assessments and see how we can help reduce the workload. 

resources-whitepaper-state-of-third-party-risk-management-2023
State of Third-Party Risk Management 2023!

Venminder's seventh annual whitepaper provides insight from a variety of surveyed individuals into how organizations manage third-party risk today.

DOWNLOAD NOW

Vendor Data Breach: Next Steps to Take With Your Third Party, Organization, and Customers

4 min read
Featured Image

In the world of third-party risk management, vendor data breaches continue to dominate headlines. Healthcare and the financial services industries are frequent targets because of the abundance of sensitive data they handle. However, any organization that uses vendors can be impacted by a data breach and expose consumer data.


In general, it’s best to have the assumption that a data breach is inevitable, so you’re better prepared on how to respond. When a data breach occurs, you’ll need to perform certain actions on three separate fronts – with your vendor, your customers, and internally.

After a Data Breach: What to Do With Your Vendor

After your vendor has confirmed a breach, it’s important to act quickly to protect your brand and customers. Here are some actions you’ll need to take with your vendor:

  • Confirm vendor is protecting data. The details of this process should already be documented in an incident response plan, so you’ll want to make sure the vendor is taking the right steps. You’ll also want to follow up with your vendor on an ongoing basis to make sure the data remains protected.
  • Refer to your contract. Ideally, data breach notification requirements will be included in your vendor contract. Trust can be easily broken during a data breach and it’s a good idea to refer to your contract to ensure that the vendor is meeting their obligations.
  • Set expectations about the next steps. When the data breach originates with your vendor’s system, you’ll want their cooperation in performing deep audit testing. A vendor that isn’t willing to do this should be a red flag that this partnership isn’t healthy. 

After a Data Breach: What to Do for Your Customers

A vendor data breach that impacts your customers may seem catastrophic in the moment, but there are steps you can take to limit the impact and protect your reputation:

  • Notify your customers. One of the worst things you can do is delay notifying your customers about the breach. News travels quickly and you don’t want your customers to see negative headlines before you’ve even notified them.
  • Offer credit monitoring. Your customers will understandably be concerned if their non-public personal information (NPPI) has been exposed in a breach. Certain information like social security numbers is generally unchanged throughout a person’s lifetime, so you might consider offering credit monitoring services to decrease the risk of identity theft. 
  • Strengthen user authentication. If your customers have access to online tools, make sure that the user authentication procedures are updated to be more robust. This can mean implementing multi-factor authentication (MFA) if not already in place. 

vendor data breach next steps

After a Data Breach: What to Do In Your Organization 

Even though the breach occurred externally in your vendor’s system, there are several things you’ll need to do internally with your organization. The following activities should be included in a remediation policy that will lessen the impact after a breach: 

  • Verify the scope. Whether the breach affected one individual or multiple customers, you’ll need to understand how many people are involved. 
  • Notify external parties. Depending on your industry, you may need to contact law enforcement, regulators or the State Attorney General after a breach occurs. 
  • Analyze the root cause. It’s essential to understand why and how the vendor data breach occurred so you can use that information to strengthen your information security system. 
  • Assess your security processes. Take the time to review your current processes to identify any other gaps that may have been overlooked. 
  • Document the incident. Dealing with a breach can be stressful, but don’t forget to document all the details along the way. It’s a good idea to include the initial communications with your vendors and customers and any internal updates you make within your security processes.

3 Mistakes to Avoid When Responding to a Vendor Data Breach

Responding to a vendor data breach can be a stressful situation, even if you’re fully prepared and understand exactly what to do. As you’re remediating the issue with your vendor, customers, and your organization, be sure to avoid these three mistakes:

  1. Passing the blame. It might be tempting to shift all the blame to your vendor, but remember that your customers and regulators will ultimately expect your organization to take responsibility to investigate the breach and strengthen your existing information security processes.  
  2. Performing a weak assessment. After a breach, take the opportunity to do a thorough security assessment to learn more about what did and didn’t work. You may discover additional security gaps that were previously overlooked
  3. Going back to business as usual. There’s no use in performing an assessment and root cause analysis if you’re just going to continue using the same security procedures. Learn from the incident and apply your knowledge so you can be even more protected against the next vendor data breach. 

Cyberattacks and data breaches are constantly evolving and it’s unrealistic to think that you can fully prevent one from impacting your vendors and organization. The key is to understand what to do when one occurs so you can quickly respond and protect your customers’ data. 

Subscribe to Venminder

Get expert insights straight to your inbox.

Ready to Get Started?

Schedule a personalized solution demonstration to see if Venminder is a fit for you.

Request a Demo