6 Eye-Raising Third-Party Breaches
August 11 2018
Image Source: Adobe Stock (the_lightwriter)
According to data released earlier this year, the most expensive data breaches start with third parties. Whether it is from poor configuration of online resources managed by a service provider, insecure third-party software, or insecure communication channels with partners, working with third parties can expose organizations to a ton of risks if they don’t pay close enough attention.
This year has offered up some crucial examples of the consequences of lax partner and vendor management. Here are a half-dozen highlights.
Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading. View Full Bio
6 Eye-Raising Third-Party Breaches
August 11 2018
Image Source: Adobe Stock (the_lightwriter)
According to data released earlier this year, the most expensive data breaches start with third parties. Whether it is from poor configuration of online resources managed by a service provider, insecure third-party software, or insecure communication channels with partners, working with third parties can expose organizations to a ton of risks if they don’t pay close enough attention.
This year has offered up some crucial examples of the consequences of lax partner and vendor management. Here are a half-dozen highlights.
Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading. View Full Bio