How Are Increasing Cybersecurity Regulations Impacting Your Vendor Risk Management Strategy?

As data breaches continue to rise, businesses are more at risk than ever. These incidents have demonstrated that organizations are not just at risk through their own networks, but also through their third parties’. Read how increasing cyber security regulations impact vendor risk management on Bank Info Security.

Aussie Blood Data Breach Highlights Third Party Risk

Read Phil Muncaster’s article about how the Australian blood data breach highlights the third party risks on Infosec Magazine : A 2016 privacy snafu which exposed the personal details of over half a million Australians was caused by “one-off human error” from a third-party contractor, the local Information -Commissioner has confirmed. Read his full article here. […]

How to protect your company from third-party data breaches

Read Ian Barkar list steps for companies to protect themselves from third party data breaches on Beta News : It’s becoming increasingly clear that data breaches can happen to any company and at pretty much any time. Protecting your company’s data isn’t just about securing your own systems, it also means ensuring that any third-parties you […]

Ransom demand and held hostage – Netflix’ third-party risk management failure

Read why says that the ransom demand from Netflix is a Netflix’s third party risk management failure on CU Insight : When I think of a robbery and hostage situation, “Dog Day Afternoon” with Al Pacino comes to mind. But the reality in 2017 is there is likely a greater danger of an organization’s data […]

Delivering Security Services Now Critical to MSP Success

MSPs have largely leveled the playing field for SMBs, enabling these organizations to deliver an optimal customer experience and service users as handily as their larger counterparts. But underpinning this success is a plethora of customer data that must be securely captured, stored and accessed. Read why delivering stable security services is critical to MSP […]

Don’t let this data breach threat end your business

Read Suleman Din take a look at how 3rd party vendors data breach could effect a organisation on Financial Planning : Every four years, Heron Financial Group completely tears down and rebuilds its technology platform. One big focus: A review of how every vendor handles clients’ private data, says David Edwards, head of the New York-based […]

What 2017 has in store for cybersecurity

Read what is in store for cyber security in 2017 according to Ryan Francis on CSO Online : There is much uncertainty surrounding the security industry for 2017, and according to experts in the field, a lot of the trepidation is directly connected to what the nation’s next president will do. Here’s what security vendors and analysts […]

How to avoid supply chain hacking

Read Lucy Dixon explain how businesses can avoid supply chain hacking on Supply Chain Digital : Do you know exactly what your business is spending money on? It might seem like a strange question, but according to an AmeriQuest Business Services survey*, an alarming amount of companies cannot answer it. They have no purchasing strategy in […]

Attacking Cybersecurity from the Inside Out: Part III

Over the last couple of weeks, we’ve explored the steps a company’s leadership team should take to prioritize cybersecurity and how businesses can improve their cybersecurity strategy by enhancing their employee-level cyber protocols. Read the third installment of the Attacking Cybersecurity from the Inside Out series which helps companies to protect against cybersecurity threats posed […]

Security landscape plagued by too many vendors: Cisco

Vendor saturation is one of the biggest challenges currently plaguing the cybersecurity market, according to system engineer security for Cisco Systems Ronny Guillaume, who is concerned that organisations are surrounded by too much noise to truly understand what it is they actually need to protect their business. Read why Ronny Guillaume of Cisco Systems says that […]