Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingCyber Case Studies

What the Kaseya attack can teach local governments about preventing third-party data breaches

Case Study

By Joel Burleson-Davis
hacking freepik
September 15, 2021

It’s the phone call no information security executive wants to get. A few months into his tenure as a chief information security officer for the Town of Gilbert, Ariz., Tony Bryson learned that one of his municipality’s most significant vendors had experienced a cybersecurity incident. Bryson’s first concern was whether the Town of Gilbert’s government data had been compromised. But he was also worried about the long-term implications of a partnership that provided critical services to the town.


Unfortunately, phone calls like the one Bryson received are becoming almost inevitable. It’s no longer a question of will you get hacked, but when. And increasingly, hackers are targeting third-party vendors to gain access to other organizations, including governments like the Town of Gilbert. Look no further than the headline-grabbing breach of IT management software supplier Kaseya, which set off one of the most significant supply chain attacks in history. 


Nearly 60% of data breaches can be traced to third-party vendors. And as further evidenced by the Kaseya attack, compromised partnerships with a long-term vendor can lead to a substantial loss of money, time and productivity.


The good news is that there are ways to minimize, or at the very least mitigate, the risks associated with supply chain attacks. In a recent report on the state of third-party security, 44% of organizations surveyed said they had experienced a third-party data breach within the last 12 months. Of those organizations, 74% attributed the breach to giving too much-privileged access to third parties. Luckily, that’s one piece of the third-party cybersecurity pipeline that can be solved. 


For his part, Bryson scaled the Town of Gilbert’s cybersecurity defenses by adopting a preventative solution through third-party security company SecureLink. 


Streamlining security at scale

When the Town of Gilbert first started working with SecureLink six years ago, the critical catalyst was compliance. Like many local governments, the Town of Gilbert needed a solution that enabled them to securely and seamlessly provide application services to hundreds of thousands of residents in a manner that met state and federal data protection and privacy laws. But they found that their previous vendor management program was too complex, unwieldy and expensive. 


While the Town of Gilbert’s government had used Virtual Private Network (VPN) services in the past, it found them cumbersome and lacking flexibility. Not only do VPNs take longer to install, but they also don’t provide an airtight security environment for third-party vendors — even more so in the remote work environment many of us now find ourselves in. Indeed, according to a new report, there has been a spike in malicious actors targeting unpatched VPNs after the pandemic’s onset in March 2020. 


Unlike a VPN, the technology relies on a clientless, web-based application. As a result, Bryson said, vendors can spend more time focusing on their support activities and less time figuring out how to get into the system.


“When a vendor does have to respond to a support call for us, they tend to connect quickly, get the job done and then, boom, they’re gone,” he said. “And it goes back to the simplicity of the system and the elegance of the interface.”


The platform’s ease of use also streamlines the process of training employees. Even those without technical backgrounds can immediately start using the application, which saves time and money.


Guarding against third-party cyberattacks

The real payoff of the Town of Gilbert’s investment in a preventative cybersecurity technology, however, came after one of its vendors was breached. The technology allows organizations to place vendors within a particular support envelope that prevents damage to their own systems. It also creates an audit log that functions a lot like CCTV footage after a crime.


Having this kind of preventative technology “gave us a level of transparency that we needed,” said Bryson. “Without it, we may not have had that ability to move forward with that vendor.”


Too often, this is not the case. It took experts weeks to untangle the nuances of REvil’s ransomware attack against Kaseya’s VSA server, and the total number of customers impacted still remains unknown. This level of opacity around supply chain attacks is hardly surprising since the Ponemon report reveals that 59% of organizations don’t use automated tools to monitor the activities of third parties.


Prioritizing preventative solutions

Bryson is well aware that the need for third-party security isn’t going away any time soon. “The world is shifting more and more to an online environment where service providers reach out and virtually touch your systems. So to keep up, we need cybersecurity services to help keep our system secure and our vendors on their toes. The fact that we have this product to lean on is just a massive advantage for us,” he said. “And because of where we’re headed with the post-COVID-19 world, this is a service that we’re going to need more of, not less.”


When the Town of Gilbert first partnered with SecureLink, they selected the platform because it offered the full “trifecta” of advantages: security, usability and cost-effectiveness. As the town’s needs have evolved, Bryson and his colleagues said their security solution has evolved in lockstep, keeping the municipality on the edge of innovation — and protected at all times.


The Town of Gilbert’s proactive approach to third-party security is one other governments would do well to model for their own peace of mind as well as that of their constituents. Describing the Town of Gilbert’s partnership with SecureLink, Byson says, “It’s freeing. It allows the chief security officer the chance to sleep at night.”


When we think about recent attacks like Kaseya, JBS, Colonial Pipeline and SolarWinds, the takeaway is clear: organizations must do everything they can to protect their critical infrastructure, environments, and networks. Above all else, that means investing in preventative cybersecurity solutions — preferably before the next Kaseya-level attack.

KEYWORDS: cyber security ransomware supply chain third-party security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joel Burleson-Davis is SecureLink's Chief Technology Officer.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • screen-enews

    Here's What the Wells Fargo Outage can Teach us About Risk Management

    See More
  • Ebola

    Aid Under Attack: What the DRC’s Ebola Crisis Teaches Us About Security and Local Perceptions

    See More
  • Security leaders can learn about decision making from poker

    What poker can teach security leaders about decision-making

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing