Also written by Kacy Zurkus:
Turn data from risk liability into an asset
x hide permanently

Do third-party vendors have a bullseye on their backs?

CIO.com

Because there are so many different kinds of third parties, identifying whether they do or don’t have the right infrastructure or security protocols can be a challenge. As so many organizations rely on a variety of different providers, third parties can become the gateways to the network. In order to mitigate the risk of a breach from a third party, enterprises need to design a vetting process and understand the language of the service-level agreemen in order to best evaluate their contracts.