Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Avoiding Third-Party Access Pitfalls That Cause Security Risks

    By
    Darryl K. Taft
    -
    January 29, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Avoiding Third-Party Access Pitfalls That Cause Security Risks

      1 - Avoiding Third-Party Access Pitfalls That Cause Security Risks

      Here are several common third-party access mistakes organizations should avoid and alternative practices they should implement to shore up IT security.

      2Pitfall: Believing They Do What They Say They Do

      2 - Pitfall: Believing They Do What They Say They Do

      Vendors need access to critical systems in the normal course of business, but that doesn’t mean they need access to all of the information in the systems. In a health care setting, for instance, a vendor may need to access an electronic health records system to provide important software updates, but they don’t need to access individual health records. The same can be said for financial and operational systems that house vital and valuable insider information. Trusting that vendors and contractors don’t have either curious or malicious insiders is a pitfall that has resulted in data breaches time and time again.

      3Pitfall Alternative: Monitor Vendor Actions

      3 - Pitfall Alternative: Monitor Vendor Actions

      Monitor and chaperone vendor actions in real time or review recordings after the fact to help with root-cause analysis or verification that the job is done right. Recording and monitoring all privileged access activity provides transparency and visibility, and becomes useful in an IT security audit following a compromise. The inability to trace backward by reviewing remote access sessions and log-ins from users can be crippling to an organization that needs to close security gaps or meet compliance regulations. Technology that captures and records this information is essential when acknowledging that public- and private-sector businesses are consistently being probed for weaknesses.

      4Pitfall: Vendors Don’t Operate in a Vacuum

      4 - Pitfall: Vendors Don't Operate in a Vacuum

      Organizations often make the mistake of believing their vendors and other third parties operate in a vacuum and may fail to take the steps to ascertain their security risks. The often weak security practices of vendors make these third parties a prime target for hackers. Taking advantage of vendor access to organizations’ networks, hackers can get in, plant malware, snoop around in critical business systems and wreak havoc.

      5Pitfall Alternative: Record Vendor Actions

      5 - Pitfall Alternative: Record Vendor Actions

      Audit and log all vendor actions. This is important not just for compliance but also to provide intel on their activities to other security or behavioral analysis systems for dashboarding and correlation against other events for a holistic security view. Spotting suspicious activity—such as access to unusual systems or during odd hours—early on will help limit the reach and potential damage of a data breach.

      6Pitfall: Vendors Have All the Fun (in Your Network)

      6 - Pitfall: Vendors Have All the Fun (in Your Network)

      Offering carte blanche access to your network is a recipe for a substantial data breach. Many employees, vendors or other privileged users may only need access to limited, or very specific, systems, while some privileged users, such as IT administrators, require broader access. Implementing granular access controls can prevent hackers from infiltrating your system via a vendor and causing substantial damage. The inability to limit permissions for vendors and other third parties is one of the reasons the average length of time to detect a data breach has reached 243 days.

      7Pitfall Alternative: Set Time Limits

      7 - Pitfall Alternative: Set Time Limits

      Limit the time third parties have access to the systems that require work. Kick them out of systems when that time limit is up. Let them ask for more time if needed. If a system is compromised, any malicious activity would be stopped once the user’s session comes to an end.

      8Pitfall: Vendors Like to Ask for Forgiveness

      8 - Pitfall: Vendors Like to Ask for Forgiveness

      We’ve all heard (and probably acted on) the adage, “It’s easier to ask forgiveness than it is to get permission.” Vendors and other third parties are no different. Without maintaining tighter controls over who is accessing what and when in the network, organizations open themselves up to data breaches. Allowing vendors to connect to much more of the network than needed without explicit permission also opens the doors for hackers to access those same systems.

      9Pitfall Alternative: Vendors Should Ask for Permission

      9 - Pitfall Alternative: Vendors Should Ask for Permission

      Make vendors ask for permission by ensuring that dual controls and approval workflows exist in order to protect critical systems. Why do they need access? Make them tell you in an ad hoc manner. Then you decide if you want to grant it before they get in. Adding alerts for ad hoc access requests also allows users to address urgent issues without sacrificing security.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.