Blog

  • Enterprise Password Management Best Practices

    Enterprise Password Management Best Practices

    Cyber-attack is a major bane of businesses today. It affects customers’ trust and weakens any organization’s progress. Enterprises must engage the best enterprise password management practices to prevent the malicious activities of hackers.

    (more…)

  • How to Achieve Tax Security Compliance?

    How to Achieve Tax Security Compliance?

    Filing taxes is a must for every business. It’s also something most dread. Not only do companies have to worry about incurring penalties from the IRS if taxes aren’t properly filed, but there are also compliance regulations. Achieving tax security compliance doesn’t have to be a nightmare if you have an income tax compliance checklist to follow.

    (more…)

  • FAIR Risk Management Framework Checklist

    FAIR Risk Management Framework Checklist

    Factor Analysis of Information Risk (FAIR) is designed to manage vulnerabilities and incidents within an organization, network, or system using a risk-based approach. The main strength of the FAIR risk framework is the use of numerical values, mathematics and quantification to get precise and accurate results and responses.

    (more…)

  • The Importance Of Having And Performing A Risk Assessment (And How To Create One)

    The Importance Of Having And Performing A Risk Assessment (And How To Create One)

    Everyone knows that cyber risks are changing and one of these is through social engineering. If you’re not familiar with the threat, it’s when hackers use deceptive methods to get individuals to divulge personal information with the express purpose of using the data for fraud. Social engineering risks aren’t the only ones companies need to worry about, there are other cybersecurity threats. This is why businesses must perform regular assessments.

    (more…)

  • Do You Need a Third-Party Risk Assessment Checklist?

    Do You Need a Third-Party Risk Assessment Checklist?

    Third-party risk assessment checklists are growing more necessary with the expansion of digital transformation. Organizations of all sizes are vulnerable to back-door attacks in ways that they weren’t a decade ago.

    Imagine that your company spent thousands of dollars and hundreds of work hours meeting compliance standards. You invested in risk assessments, penetration testing, and you have a strong policy for software patching and employee phishing training. And after all you’ve done, your network is compromised thanks to lax cybersecurity on the part of one of your third-party vendors.

    Unfortunately, the scenario above was true for over half of the security breaches in 2018, and the number of back-door hacks through third-party vendors is rising. It’s for this reason that your organization may require a third-party vendor management checklist.

     

    What is a Third-Party Vendor Risk Assessment Checklist?

    A vendor risk assessment checklist is an internal document that your cybersecurity team can use to ensure that you are safe from cyber attacks through third party vendor vulnerabilities. Typically, your vendor risk management checklist is one piece of a broader vendor management cybersecurity policy.

    The purpose of this guide is to discuss whether or not your organization needs a third-party vendor management checklist. If it does, then we’ve outlined a working checklist to get you started on establishing a sustainable third-party risk management strategy.

     

    How Do You Know if Your Business Needs a Third-Party Vendor Management Checklist?

    It’s true that not every organization needs a third-party vendor management checklist. If your operation is small and doesn’t manage sensitive data – like consumer personally identifiable information (PII), employee, or proprietary information – then a vendor risk management checklist may not be necessary.

    Also, if you do not allow any vendors access to sensitive information, you may not need a vendor risk assessment checklist. However, you may need to have one if you intend to share sensitive information or grant network access to a third-party in the near future. Here are three reasons that your business may need a vendor management checklist.

     

    Assess your Third Party Risk Management

     

    If Any Third Party Vendor has Access to Your Network or Data

    Most businesses partner with a third-party to serve clients. If any vendor has access to your network or data, then there’s a good chance that your business needs a vendor management checklist. This access could include remote access or vendor employees that visit your campus to fulfill their contracted services.

    If Your Business Must Meet Data Security or Consumer Data Privacy Compliance Standards

    Organizations that collect, manage, and share consumer data are accountable to at least one – usually more than one – set of consumer data privacy laws. Those organizations managing medical data must meet strict compliance standards relating to consumer data privacy and cybersecurity measures. If your business is one of those organizations and partners with vendors in any capacity, you will most surely need a vendor management checklist.

     

    If the Value of the Data Exceeds Prevention Costs

    Your business and client information holds a certain amount of monetary value. Should you lose the data, you should know the financial loss associated with that lost/stolen data. If those costs exceed the cost of preventative measures – such as cybersecurity, third-party vendor management policies, penetration testing, etc. – then you must make sure that your vendors do not compromise that security.

     

    What is Included in a Vendor Risk Assessment Checklist?

    If you’ve determined that your organization needs a third-party vendor management checklist, then the following set of questions will help you establish a third-party management program.

    It’s important to keep in mind that this questionnaire is by no means exhaustive. Your checklist may need to be more or less detailed depending upon your industry and the nature of your business.

     

    Is your organization compliant?

    This should go without saying. However, a surprising number of organizations concerned with third-party risk fail to meet minimum cybersecurity standards themselves. Investing in your own cybersecurity by ensuring compliance, training staff, and maintaining patching/updates is the first critical step in securing your network.

     

    Have you created a vendor management cybersecurity policy?

    If you work with or plan to work with third-party vendors, then company decision-makers should have a clear third-party management cybersecurity policy. The policy should outline how you determine if a vendor is a good choice, as well as how you engage your vendors on security controls. Your vendor risk assessment checklist forms only a piece of your overall vendor management policy.

     

    Do you have an accurate, up-to-date data map?

    Your data map shows all information that flows in and out of your organization. As you onboard new vendors, you should have a clear picture of which vendor will have access to what data.

     

    Did you perform due diligence on the third-party vendor to validate their credibility?

    Your vendors should have valid articles of incorporation, business licenses, proof of relevant compliance, physical locations in accordance with relevant compliance standards, and a list of credible references. You should also check to see if the vendor is on any watch lists (including a global sanctions list), has hired any legally-suspect key staff, or is currently undergoing criminal or civil litigation.

    ADA

    Is the third party vendor in any kind of financial duress?

    It is appropriate to examine available financial statements and tax documents from your third- party vendors. Financial vulnerabilities often translate into mismanaged security.

     

    Does the vendor have a history of security breaches?

    Vendors with a history of security breaches could indicate poor security policies and procedures. If they have endured a breach in the past, they should provide proof that they’ve performed the necessary updates and penance projects to secure their and their clients’ networks.

     

    Have you reviewed the vendor’s cybersecurity policies and procedures?

    Examining your vendors’ cybersecurity policies and procedures is a great indicator of how seriously they take their security and the security of their clients.

     

    Have you reviewed the vendor’s incident response plan?

    It’s critical that your vendor have a process for dealing with security incidents, no matter how small. Breach attempts often signal vulnerabilities. Organizations that monitor those attempts and patch software weaknesses are in a good position to protect their and your data.

     

    Does the vendor contract clearly state security expectations?

    Third-party vendor contracts should reflect your vendor management expectations as stated in your vendor management cybersecurity policy.

     

    Does the vendor contract allow you to terminate the work agreement if the vendor fails to meet security standards?

    Should it become apparent that one of your vendors is negligent or dishonest about their security policies and procedures, you must be free to take your business elsewhere.

     

    Is the vendor willing/able to disclose cybersecurity risk assessment results?

    A risk assessment is one of the best ways to quantify cybersecurity risk in real dollars and cents. Reviewing a vendor’s assessment results will give you a clear picture of your third-party risk.

     

    Is the vendor willing/able to complete third-party risk assessment questionnaires as needed?

    Most vendor management policies include recurring security questionnaires. How your vendors answer these questionnaires is also a valid way to assess your vendor risk.

     

    Is the vendor willing/able to provide penetration testing results?

    If your vendors are serious about cybersecurity, they’ve likely invested in penetration testing. Reviewing those pen test results will help you further measure up your vendor’s security policies and procedures.

     

    Do you have someone assigned to manage your third-party risk?

    The most important part of your vendor management cybersecurity policy is assigning a person or team to monitoring third-party risk. Outlining vendor management responsibilities ensures that your vendors don’t compromise your data or network.

     

    Key Takeaways

    If your organization manages sensitive information and hires third-party vendors to handle certain tasks, you more than likely need a vendor management cybersecurity policy and a third- party vendor management checklist.

    At RSI Security, we assist small and medium-sized businesses with affordable and reliable cybersecurity support. Our third-party risk management services oversee all matters pertaining to vendor risk management and back-door cyber attacks.

     

     

  • Implementing the ITIL Incident Management Workflow

    Implementing the ITIL Incident Management Workflow

    In today’s digital landscape, it’s important to have contingency plans in place in the event of a cyberattack. This is where ITIL incident management workflow comes in, which is a set of protocols businesses need to follow should an incident occur. But what are they, exactly? And how are they implemented?

    (more…)

  • What Is The NIST Small Business Cybersecurity Act?

    What Is The NIST Small Business Cybersecurity Act?

    Responding to new cybersecurity attacks and breaches The National Institute of Standards and Technology (NIST) passed the NIST small business cybersecurity act in 2018. What the act means for small businesses, is that NIST is required to provide support to small and medium-sized companies in their efforts to prevent cybersecurity breaches and attacks.

    (more…)

  • What’s Included in a Security Incident Management Plan?

    What’s Included in a Security Incident Management Plan?

    Cyberattacks occur daily. Because of this, keeping digital transactions, as well as other types of online information and data, safe is an ever-growing problem.That’s why a security incident management plan is so important.

    (more…)

  • Your HITRUST Self-Assessment Checklist

    Your HITRUST Self-Assessment Checklist

    What with the constant and evolving threat of cybercrime, it’s become more crucial than ever for organizations to protect their proprietary and customer data. Over the past year, the average cost of cybercrime for an organization has increased from $1.4 million to $13.0 million, and the average number of security breaches rose by 11 percent, from 130 to 145. Knowing this threat, HITRUST self-assessments are one of the most important ways you can prevent security breaches and maintain HIPAA compliance.

    (more…)

  • 4 Things Law Firms Should Look for in Cybersecurity Partner

    4 Things Law Firms Should Look for in Cybersecurity Partner

    Cybersecurity is essential for every kind of business, across every industry. Many companies  have no choice but to shore up their cyberdefenses, with legal mandates and penalties applied for noncompliance. And, while cybersecurity requirements for law firms are relatively lax in comparison to other industries, lawyers still have an obligation to keep their clients safe. For many firms, partnering with a cybersecurity provider is the best way to do so.

    (more…)