Skip to Content
Person searching on their computer in a dimly lit room.
In The News

Addressing the vendor threat

August 30, 2024 / 5 min read

In InformationWeek, Joe Oleksak discusses how organizations can protect themselves from cyberattacks by assessing how they engage with and choose vendors, who are often targeted by cybercriminals. 

More than a decade ago, the Target breach underscored the critical need for more robust vendor security standards. Today, these concerns have only intensified. As organizations increasingly rely on third-party services and integrate more external systems into their networks, the potential entry points for cyberthreats are multiplying the vulnerabilities that demand our attention.

Cybercriminals are growing bolder, more overt in their demands, and faster to monetize opportunities they uncover. Attacks are increasingly nuanced and sophisticated, often with hackers infiltrating networks, keeping a low profile, and patiently gaining intelligence on how organizations operate to create targeted exploits. Moreover, they are adapting to an increasingly target-rich environment, where the extensive interconnectivity of external vendors and service providers offers ample intrusion opportunities.

Therefore, it’s not surprising that the service providers multiple organizations rely on are often targets. The reason is simple: why attack one enterprise when a successful breach of a vendor can open the door to many?

Read More

Related Thinking

Business professional checking the multifactor authentication code on their cell phone.
November 1, 2024

Preparing for the inevitable: Navigating third-party tech failures

Article 7 min read
Parent sitting on the floor with their child and learning about how school districts can proactively manage cyber risk to protect student data.
October 30, 2024

Cybersecurity essentials for K-12 schools: Protecting students and data

Article 6 min read
Business professionals discussing their retirement system cybersecurity.
September 26, 2024

Cybersecurity: Protecting your retirement system from hidden threats

Article 7 min read