jason atchley

Your Cybersecurity Is Only as Good as Your Vendors’

In-House Straight

Sherry Karabin, Corporate Counsel

March 28, 2014    |0 Comments

As the number of cybersecurity breaches continues to rise, The New York Times is reporting that major corporations are requiring their law firms to increase security and then prove they did so.
Aditi Mukherji on FindLaw’s Free Enterprise suggests that small business owners should consider adopting this same tactic, especially with vendors. Mukherji reminds everyone the Target hackers breached the chain’s security systems by using electronic credentials stolen from a vendor, adding such breaches also put the company and owner at risk for legal liability.
Requiring a vendor to show proof of cybersecurity is one way to hold the vendor accountable, says Mukherji, as well as ensuring reliability and consistency in overall online security efforts.
Here are some practices Mukherji says must be addressed immediately:
  • Distribution: Be sure the vendor isn’t putting sensitive files on portable thumb drives or emailing documents to unsecure iPads.
  • Networks: Find out if vendor computers are linked to a shared network in countries like China or Russia, where hacking is prevalent.
  • Access: Determine how many people have access to sensitive information; the greater the number, the bigger the risk.
  • Proof of vendor cybersecurity should be one facet of a larger security plan that extends to other business relations, Mukherji advises.

Read more: http://www.corpcounsel.com/id=1202648843053/Your-Cybersecurity-Is-Only-as-Good-as-Your-Vendors%27#ixzz2xY1KkHsZ


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: