{"id":3515,"date":"2025-11-26T06:22:45","date_gmt":"2025-11-26T06:22:45","guid":{"rendered":"http:\/\/69269cb5fd8a399dacc3177e"},"modified":"2025-11-26T06:22:45","modified_gmt":"2025-11-26T06:22:45","slug":"three-steps-to-reducing-third-party-risks","status":"publish","type":"post","link":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/2025\/11\/26\/three-steps-to-reducing-third-party-risks\/","title":{"rendered":"Three steps to reducing Third Party Risks"},"content":{"rendered":"<h1 style=\"text-align: center;\">Three steps to reducing Third Party Risks<\/h1>\n<p><img fetchpriority=\"high\" fetchpriority=\"high\" decoding=\"async\" class=\" wp-image-11452 aligncenter\" src=\"https:\/\/seconize.co\/wp-content\/uploads\/2022\/05\/28-300x180.png\" alt=\"\" width=\"410\" height=\"246\" srcset=\"https:\/\/seconize.co\/wp-content\/uploads\/2022\/05\/28-300x180.png 300w, https:\/\/seconize.co\/wp-content\/uploads\/2022\/05\/28.png 500w\" sizes=\"(max-width: 410px) 100vw, 410px\"><\/p>\n<p><span style=\"font-weight: 400;\">In today\u2019s business climate, cybersecurity is more important than ever before. With the rise of cyberattacks, companies must take steps to protect themselves from a potential breach. One of the most underestimated and overlooked risks is a third-party risk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Third-party risks are those risks that come from outside of your company, from vendors and suppliers to contractors and partners. Essentially, any company that has access to your systems and data is a potential risk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While it\u2019s impossible to eliminate all third-party risks, there are steps you can take to reduce the chances of a breach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In recent reports, The Lapsus group, an attack group, first made headlines in December 2021 after a ransomware attack against the Brazilian Ministry of Health, exposing the PHI of millions of people. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It has since targeted multiple large companies including Nvidia, Samsung, Microsoft, Ubisoft, and now \u2013 Sykes Enterprises.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sykes, a business service outsourcing unit owned by the Sitel group, disclosed that one of their employee\u2019s Okta accounts containing customer data was breached in January 2022. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Documents leaked by the Lapsus$ group raised questions about both Sitel\u2019s and Sykes\u2019 security defenses, which highlights a pertinent challenge faced by businesses: third-party cyber risk management.<\/span><\/p>\n<h2><b>Third-party breaches are becoming a popular attack<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">As cybersecurity mechanisms advance and become better and better, so do the attackers. If you shut one door for them, they try to hack another door.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With cloud computing becoming popular, there are more and more applications connecting, sharing data, and integrating, and giving the hackers another back door entry into our systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now, we cannot eliminate third-party solutions, altogether but we can take measures to keep all applications safe from breaches and cyber attackers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are three steps that can help us become more proactive than reactive to breaches.<\/span><\/p>\n<h2><b>Three Steps To Shifting From Detecting To Predicting A Breach<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">When it comes to proactive security, detection is only half the battle \u2013 you also need to be able to predict attacks before they happen.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To do this, you need to take a three-pronged approach that focuses on people, processes, and technology.<\/span><\/p>\n<p><img decoding=\"async\" class=\" wp-image-11454 aligncenter\" src=\"https:\/\/seconize.co\/wp-content\/uploads\/2022\/05\/30-300x180.png\" alt=\"\" width=\"412\" height=\"247\" srcset=\"https:\/\/seconize.co\/wp-content\/uploads\/2022\/05\/30-300x180.png 300w, https:\/\/seconize.co\/wp-content\/uploads\/2022\/05\/30.png 500w\" sizes=\"(max-width: 412px) 100vw, 412px\"><\/p>\n<h3><b>Step I: Categorize<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The first step is to take inventory of all the vendors you work with and categorize them by risk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, you might have high-risk vendors that<\/span><span style=\"letter-spacing: 0px;\">&nbsp;have access to sensitive data, or low-risk vendors that have less access. You can then prioritize your security efforts based on this information.<\/span><\/p>\n<h3><b>Step II: Digital Footprinting<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The next step is to digital footprint all of your vendors. Scan the entire digital footprint of every third-party vendor in a non-intrusive, outside-in risk assessment. This should include Email Security, DNS Security, Application Security, Network Security, and System Security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, scan for breach exposure for the identification of inadvertent or intentional exposure of potentially sensitive information, and compromised systems to detect systems and applications involved in malicious and\/or unusual activity, and check cyber reputation to identify threats that may damage your brand reputation and eventually affect your revenue.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In Okta\u2019s case, their share price dropped by more than 7% when news of the Lapsus$ breach reached the market.<\/span><\/p>\n<h3><b>Step III: Managing risks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The third and final step is to implement a risk management program that includes vendor questionnaires, security audits, and incident response plans.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This program should be tailored to the specific risks of each vendor. For example, high-risk vendors should undergo more frequent security audits than low-risk vendors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Vendor questionnaires help you understand what security controls a vendor has in place. Security audits help you verify that these controls are effective. Incident response plans help you know what to do in the event of a breach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By taking these three steps, you can shift from detecting to predicting breaches, and reduce the chances of a breach happening in the first place.<\/span><\/p>\n<h2><b>Conclusion<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Third-party breaches are becoming more and more common, but there are steps you can take to prevent them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By categorizing your vendors, digital footprinting them, and implementing a risk management program, you can predict attacks before they happen and keep your data safe.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Three steps to reducing Third Party Risks In today\u2019s business climate, cybersecurity is more important than ever before. With the rise of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/posts\/3515"}],"collection":[{"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/comments?post=3515"}],"version-history":[{"count":0,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/posts\/3515\/revisions"}],"wp:attachment":[{"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/media?parent=3515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/categories?post=3515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/tags?post=3515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}