dcsimg

10 Best Practices for Sharing Sensitive Information with Vendors

  • 10 Best Practices for Sharing Sensitive Information with Vendors-

    One Final Point

    Do make sure you use this list as a starting point – don't only rely on this information to ensure that your data is entirely secure! The hope is that these suggestions provide you with a great place to start or affirm you're headed in the right direction in regard to IT risk management — but they can't replace thorough vendor due diligence. Make sure you do your homework!

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13

10 Best Practices for Sharing Sensitive Information with Vendors

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13
  • 10 Best Practices for Sharing Sensitive Information with Vendors-12

    One Final Point

    Do make sure you use this list as a starting point – don't only rely on this information to ensure that your data is entirely secure! The hope is that these suggestions provide you with a great place to start or affirm you're headed in the right direction in regard to IT risk management — but they can't replace thorough vendor due diligence. Make sure you do your homework!

Deloitte published a report recently, noting that "the market is currently underinvested in the area of vendor management, particularly when it comes to tools, methods and processes." This same report also noted that businesses are increasingly outsourcing functions. As vendors have become more important in the day-to-day functioning of businesses, companies need to ensure that their data is safe on these third-party networks.

For organizations that are just getting started with a formalized vendor risk management (VRM) program, BitSight Technologies has prepared a list of the do's and don'ts of sharing sensitive information with vendors.