| Blog, Penetration Testing, Vulnerabilities and Threats
On December 8, 2020, corporate security management company FireEye reported on a serious issue in their blog. According to the publication, several of the company’s accounts had been “attacked by a highly sophisticated threat actor”, most likely a...
| Blog, Third Party Risk Management
Blog Vendor Key Performance Indicators Vendor Key Performance Indicators Any successful IT company must have an effective IT vendor KPI management. Regardless of how talented each individual in the company is, tracking the KPI of vendor management is critical for any...
| Third Party Risk Management
Assessing the reputations of the people and companies with whom you do business has always been standard practice. Formally known as the vendor due diligence process, most successful companies have another party examine how any vendor operates before allowing them...
| Third Party Risk Management
What Are the Best Risk Management Best Practices? Now that the global supply chain is becoming more complex, and companies are establishing relationships with an increasingly intricate network of partners, third-party risk management is imperative. We recommend to...
| Third Party Risk Management
In an era when protecting digital assets is essential for all companies, you must find ways to identify and mitigate risks from your vendors and suppliers. It is your partners, suppliers, and sub-contractors who enable your organization to thrive and diversify. These...
| Third Party Risk Management
What Is a Third-Party Data Breach? In short, a third party breach occurs when a secondary vendor for a product has sensitive data stolen from them. In previous decades, the most common form of the breach was a primary breach, when attacks were on their direct targets....