Follow Us

Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cybersecurity Technology Media and Telecom

It’s Time to Take Third-Party Risk Seriously

The use of new technologies such as the Internet of Things (IoT), mobile and cloud by vendors add to the question: Where is my data, and how can I protect it when it is in someone else’s hands? In the hustle and bustle of daily business, third parties often become the overlooked or unwitting accomplice in criminal activities.

X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.

A recent study of 600 IT and security decision-makers revealed that though 60% of organizations have formal third-party risk policies, 44% of them have experienced a significant breach caused by a vendor. This is disturbing in itself, revealing a major discrepancy between the third-party policies organizations espouse and those policies’ effectiveness. But what’s more, only half of firms discontinued their relationship with the guilty vendor, and 69% did not change the risk policies that had just failed them.

This premium content is locked for Cybersecurity Law & Strategy subscribers only

Continue reading by getting
started with a subscription.

ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN CYBERSECURITY, PRIVACY, INFORMATION GOVERNANCE, LEGAL TECHNOLOGY AND E-DISCOVERY.
  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on cyber threats, data breaches, and legal technology
  • Tap into expert guidance from top legal tech lawyers and experts

SUBSCRIBE NOW

Subscribe Now For Unlimited Access

Read These Next