Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity NewsEnterprise Services

5 Tips for Minimizing Third-Party Risk

By Grant McCracken
risk-enews
June 18, 2020

Outsourcing has become a vital part of most business strategies. Not only is it a way to save money, but it’s a simple way to take advantage of expertise you might not currently have in house. But outsourcing can also leave companies vulnerable if the third-party doesn’t have proper cybersecurity procedures.

In fact, looking at all data breaches over the last two years, more than half of them were the result of a third-party data breach. Within the last year alone, the FBI, U.S. Customs & Border Protection, Capital One and Palo Alto Networks have had data compromised as the result of a third-party breach.

The problem is that many third-party vendors feel they are too small to be targeted by cyberattackers. However, as we all know - this is certainly not the case. The reality is that these third parties are trusted with huge amounts of sensitive customer data in order to effectively carry out their job. And if cyberattackers think that these are the weakest link in your security ecosystem, then they are going to be ground zero of bad actor efforts to gain valuable corporate and customer data.

Companies need to recognize that, unfortunately, risk is all around. However, there are things organizations can do to minimize that risk - especially when it comes to the vendors with whom they do business.

 

1. Thoroughly Vet Third Parties Before They Have Access to Your Data

Though organizations usually agree that vetting third parties is critical to doing business with them, 60 percent still don’t think they’re doing a good enough job vetting them. Improving the diligence and situational awareness around this area is the first step to enhancing your vetting process.

To thoroughly vet third parties, you must invest in the right tools and determine the most important certifications. Endless spreadsheets are time-consuming and ineffective, but the right vetting tools and credentials give you a better picture of the type of vendor you are willing to trust with your data. As the infamous saying goes, you get what you pay for. Think of choosing a vendor like buying a car; you have to look at the entire car to ensure it’s up to standard. Just kicking the tires and color won’t give you a full picture of what you’re investing in.

Determining credentials that are important to you also plays a role in this process. Criteria can be anything from “has the vendor experienced a data breach in the past” to “does it invest in next-gen security solutions?”

 

2. Ask for References

We ask for references for almost every choice we make - so why not when accessing the security commitment of our vendors? It’s not good enough to take a third-party’s word that they are top-notch - go a layer deeper and ask other organizations that have used their services what they truly think. It’s like any restaurant review: if the reviewer had a good or bad experience, they will be sure to let you know. When asking for references, get specific. If you want to talk to a former, long-term or new customer, ask!

 

3. Apply the Same Standards Internally to Third Parties

Once you’ve selected a vendor, they’ll work with you to determine a Service Level Agreement (SLA) that meets your necessary requirements and maps out the security controls that they must maintain.

Don’t throw caution to wind here and assume that the vendor’s standard protocols are good enough. Holding third parties to the same security standards that you apply internally is your best bet to ensure that data is protected.

 

4. Restrict Access, Don’t Overshare

In tandem with the idea of applying the same internal standards to third parties, organizations shouldn’t share data with anyone that doesn’t need access to perform their job function. For example, the engineering team doesn’t need access to HR documents on each employee, so we restrict access so that only HR can access that data. The same goes for third parties - if they don’t need the data to do the work in their remit, restrict access. This contains the blast radius in the event that one of your vendors does experience a data breach.

 

5. Routinely Audit for Third Parties’ Cybersecurity Procedures

After you’ve thoroughly vetted your third parties, you can’t just set it and forget it. It is also important to continually check-in on your third parties’ cybersecurity procedures because, to put it simply, things can change.

Usual contracts give organizations the ability to audit its third parties whenever they want, but I’d recommend every six months to a year. This keeps the vendors on their toes, without creating a strenuous relationship with your partners.

Trusting third parties with sensitive data can be risky, but with some due diligence and little skepticism, you’ll find partners that hold themselves accountable for keeping your data secured.

KEYWORDS: cyber security outsourcing risk management third-party security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Grant mccracken

Grant McCracken is the Senior Director of Operations, Programs and Security at Bugcrowd. A long time veteran to Bugcrowd, Grant joined the organization as an Application Security Engineer in 2014. Since then, he has overseen the creation and maintenance of hundreds of crowdsourced security programs as a Solutions Architect, as well as led the Researcher Success, Support, and Security Operations groups. He has been hacking for nearly a decade and is an Offensive Security Certified Professionals (OSCP). In his free time Grant enjoys writing and performing music, as well as staying active on running or hiking trails.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Ehret

    5 minutes with Jonathan Ehret – The need for third-party risk management in cybersecurity

    See More
  • third-party risk

    Considerations for third-party physical security risk

    See More
  • two people working together over desk

    Streamlining third-party risk management for enhanced resilience

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing