A Third-Party Management Best Practices Checklist

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next A Third-Party Management Best Practices Checklist-7 Next

Learn from the Latest Data Breaches

Home Depot, one of many retailers breached in the past year, was breached by hackers who stole credentials from a third-party vendor that had access to the payment system. In fact, 44 percent of company data breaches involve third parties. Organizations should use past breaches to learn and ensure that they understand which vendors or business partners (and not just the obvious IT ones) have access to IT systems, double check security measures, assess third-party risks, and make the necessary changes to ensure a higher level of security and scrutiny.

Regardless of what business you're in, chances are you're working with more third-party organizations today than ever before. Whether it's human resources, IT, marketing or everyday vendors, businesses are increasingly looking to third-party suppliers to help reduce costs and grow the business. While these third parties can provide great opportunities for a company, they can also pose great risks – some catastrophic to your brand and revenues – if not properly managed. For instance, who would have guessed that a regular HVAC vendor could be at the center of a multimillion dollar data breach? Or a consultant disguised as a domestic-supplier could lead to one of the largest FCPA enforcement actions in history?

In this slideshow, Greg Dickinson, CEO of third-party management expert Hiperos, provides a checklist that companies must keep in mind to ensure due diligence when working with third parties.


Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

More Slideshows

PlexxiITRoles0x IT Roles: The New Faces of Network Infrastructure

The newfound emphasis on tools and service integration is shaping a new crop of industry professionals — the actual faces behind the IT infrastructure. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

IT_Man89-290x195 9 Tips for Running a 'Tween' Company

Advice and tips for entrepreneurs and companies that are no longer startups but not quite ready for an IPO, also known as "tweens." ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.