A Third-Party Management Best Practices Checklist

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next A Third-Party Management Best Practices Checklist-5 Next

Know Their Access

Not knowing that a third party had access to system passwords is not a valid excuse when your client's records are stolen. Understanding what each party has access to – and why – will ensure that you have control over their access and can limit or deny access to sensitive information as appropriate.

Regardless of what business you're in, chances are you're working with more third-party organizations today than ever before. Whether it's human resources, IT, marketing or everyday vendors, businesses are increasingly looking to third-party suppliers to help reduce costs and grow the business. While these third parties can provide great opportunities for a company, they can also pose great risks – some catastrophic to your brand and revenues – if not properly managed. For instance, who would have guessed that a regular HVAC vendor could be at the center of a multimillion dollar data breach? Or a consultant disguised as a domestic-supplier could lead to one of the largest FCPA enforcement actions in history?

In this slideshow, Greg Dickinson, CEO of third-party management expert Hiperos, provides a checklist that companies must keep in mind to ensure due diligence when working with third parties.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.