For businesses with 15–150 employees with small or no IT staff.
For businesses with 150–5,000 employees who need to fill gaps or are looking for help.
FEATURED RESOURCE
Working from home is not going anywhere. In fact, research shows that post-pandemic 42% of employees who worked strictly from a company-based location will not return to the office. Do you know how this will impact your business? Learn more about the tools needed to protect your client data and improve employee productivity.
Real People. Right Now.
From the first hello, the Locknet® team is dedicated to serving you and your needs.
For businesses with 15–150 employees with small or no IT staff.
For businesses with 150–5,000 employees who need to fill gaps or are looking for help.
FEATURED RESOURCE
Check out the latest happenings in the world of IT from our Locknet® experts. In this issue, we highlight some topics your organization should be aware of to minimize risks. Specifically, mitigating insider threats to your security and the risks of hanging on to legacy data.
Real People. Right Now.
From the first hello, the Locknet® team is dedicated to serving you and your needs.
A 2016 survey by the independent Ponemon Institute, shows that 56 percent of organizations have had a breach caused by one or more of their vendors.
Yet, fewer than one in five companies, 17 percent, felt their organization effectively managed third-party risks. Less than half said that managing outsourced relationship risks was a priority in their organization. That thinking has turned into a serious mistake for many.
Hackers view small to medium size businesses as less protected and a potential back-door entry to larger organizations. Last year Target paid $18.5 million to 47 states for a 2013 breach created when criminals entered Target’s system through a refrigeration, heating, and air conditioning subcontractor. Yahoo also experienced a massive break-in caused by a third-party vendor.
Did the Target HVAC contractor gain back his reputation? The damage to smaller companies, with fewer resources to recover, can be devastating. Yet, more than half of companies don’t keep a comprehensive inventory of third parties that share their sensitive information—or are allowed free remote access to their network.
Also unsettling, is criminals can continue to create risks even ‘after’ vendor termination, taking advantage of patches and outdated software. Unfortunately, this is the soft underbelly—the entry point for many vendor-connected breaches.
There’s a saying in the managed security industry that you’re only as secure as your ‘least secure’ contractor. Managed security can minimize the risk of hiring a third-party vendor if you can find the right one. Here are questions that can peel back their vulnerabilities and raise red flags.
Before hiring a managed security partner ask if they:
Invite managed security companies to your site to meet. Let them put a trained eye on your current security.
Here are some questions they may ask you:
Most likely you’ve done a good job vetting your primary vendors. Considering the heightened threats, it may be time to entertain the hiring of a managed security partner who can walk ‘downstream’ and make sure your primary vendors and their subcontractors can do no damage to your sensitive data, customers, and bottom line.
Managed IT
Onalaska, WI Waterloo, IA Wausau, WI Eau Claire, WI Burnsville, MN Rochester, MN Duluth, MN
You are now leaving locknetmanagedit.com. Please check the privacy policy of the site you are visiting.