Third-party vulnerabilities are one of the most likely "attack vectors" in the information security landscape today – with retailer Target being the most notable victim of late. But conducting business without relying on any outside partners is nearly impossible and certainly cost prohibitive. It is imperative to have a comprehensive vendor risk management strategy and analysis that includes a digital security component. Understand the risks of outsourcing functions and make sure that you're comfortable with the vendor's privacy and security posture in advance of committing to the relationship.
Additionally, don't overlook nested relationships that come with doing business with third parties. Know how your vendors are protecting their relationships with other parties and the potential impact that could have on your sensitive data. Look for partners that own security end to end within their organizations and, at the very least, be diligent in evaluating and determining what additional parties are also involved in the service provided.
As you work to create a strong information security posture for your organization, it is important to consider the security framework surrounding executive communication with each other, the board of directors and even third-party partners. Executives frequently need to review and communicate about sensitive information while on the go and outside your network. As more mobile communication options become available, organizations must take precautions to secure the mobile apps and data executives are using.
In this slideshow, Diligent Corporation, a provider in secure collaboration tools for executive teams, shares five steps you can take today to tighten security around executive communication.
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ... More >>