Important to manage the security risks associated with third-party service providers

 Even for organizations not directly impacted, this incident provides incentive to revisit basic security hygiene. In particular, it is important to manage the security risks associated with third-party service providers to ensure that the security of information and information assets is not reduced when: (1) exchanging information with the third party, or (2) introducing their products and services into your environment.

Confirm that you and your third-party vendors are not implicated by the computer science vs information technology breach. Re-risk assess your data and information system assets and current security posture. Revisit your due diligence process for third-party service providers and your procurement of technology. Revisit employee security education and training. Enhance your protocols for data and information systems access, including authorizations, network segmentation, and backups. Test your security incident response plan, including, in particular, new reporting and notification requirements to regulators and government agencies.

Comments

Popular posts from this blog

Two founding signatories leave Architects Declare

Collaborative and sociable endeavour

Enrolled with the Secretary of Information and Communication Technology