Close Menu
5gantennas.org5gantennas.org
  • Home
  • 5G
    • 5G Technology
  • 6G
  • AI
  • Data
    • Global 5G
  • Internet
  • WIFI
  • 5G Antennas
  • Legacy

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
5gantennas.org5gantennas.org
  • Home
  • 5G
    1. 5G Technology
    2. View All

    Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

    August 28, 2024

    URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

    August 23, 2024

    Smart Launches Smart ZTE Blade A75 5G » YugaTech

    August 22, 2024

    5G Drone Integration Denmark – DRONELIFE

    August 21, 2024

    Hughes praises successful private 5G demo for U.S. Navy

    August 29, 2024

    GSA survey reveals 5G FWA has become “mainstream”

    August 29, 2024

    China Mobile expands 5G Advanced, Chunghwa Telecom enters Europe

    August 29, 2024

    Ateme and ORS Boost 5G Broadcast Capacity with “World’s First Trial of IP-Based Statmux over 5G Broadcast” | TV Tech

    August 29, 2024
  • 6G

    India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

    August 29, 2024

    Vodafonewatch Weekly: Rural 4G, Industrial 5G, 6G Patents | Weekly Briefing

    August 29, 2024

    Southeast Asia steps up efforts to build 6G standards

    August 29, 2024

    Energy efficiency as an inherent attribute of 6G networks

    August 29, 2024

    Finnish working group launches push for 6G technology

    August 28, 2024
  • AI

    Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

    August 29, 2024

    Why Honeywell is betting big on Gen AI

    August 29, 2024

    Ethically questionable or creative genius? How artists are engaging with AI in their work | Art and Design

    August 29, 2024

    “Elon Musk and Trump” arrested for burglary in disturbing AI video

    August 29, 2024

    Nvidia CFO says ‘enterprise AI wave’ has begun and Fortune 100 companies are leading the way

    August 29, 2024
  • Data
    1. Global 5G
    2. View All

    Global 5G Enterprise Market is expected to be valued at USD 34.4 Billion by 2032

    August 12, 2024

    Counterpoint predicts 5G will dominate the smartphone market in early 2024

    August 5, 2024

    Qualcomm’s new chipsets will power affordable 5G smartphones

    July 31, 2024

    Best Super Fast Download Companies — TradingView

    July 31, 2024

    Crypto Markets Rise on Strong US Economic Data

    August 29, 2024

    Microsoft approves construction of third section of Mount Pleasant data center campus

    August 29, 2024

    China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

    August 29, 2024

    What is the size of the clinical data analysis solutions market?

    August 29, 2024
  • Internet

    NATO believes Russia poses a threat to Western internet and GPS services

    August 29, 2024

    Mpeppe grows fast, building traction among Internet computer owners

    August 29, 2024

    Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

    August 29, 2024

    Long-term internet computer investor adds PEPE rival to holdings

    August 29, 2024

    Biden-Harris Administration Approves Initial Internet for All Proposals in Mississippi and South Dakota

    August 29, 2024
  • WIFI

    4 Best Wi-Fi Mesh Networking Systems in 2024

    September 6, 2024

    Best WiFi deal: Save $200 on the Starlink Standard Kit AX

    August 29, 2024

    Sonos Roam 2 review | Good Housekeeping UK

    August 29, 2024

    Popular WiFi extender that eliminates dead zones in your home costs just $12

    August 29, 2024

    North American WiFi 6 Mesh Router Market Size, Share, Forecast, [2030] – அக்னி செய்திகள்

    August 29, 2024
  • 5G Antennas

    Nokia and Claro bring 5G to Argentina

    August 27, 2024

    Nokia expands FWA portfolio with new 5G devices – SatNews

    July 25, 2024

    Deutsche Telekom to operate 12,150 5G antennas over 3.6 GHz band

    July 24, 2024

    Vodafone and Ericsson develop a compact 5G antenna in Germany

    July 12, 2024

    Vodafone and Ericsson unveil new small antennas to power Germany’s 5G network

    July 11, 2024
  • Legacy
5gantennas.org5gantennas.org
Home»Data»Smart vendor security will be key to avoiding data breaches in 2024
Data

Smart vendor security will be key to avoiding data breaches in 2024

5gantennas.orgBy 5gantennas.orgJanuary 30, 2024No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Factors such as inconsistent compliance leave businesses vulnerable to nefarious actors.

getty

In 2020, hackers accessed the data of thousands of companies through malware installed in a software update for SolarWinds’ IT monitoring software. The SolarWinds data breach, known as a supply chain attack, was unprecedented in its scope.

But what’s not unique about the SolarWinds data breach is the method the hackers deployed. Many modern data breaches occur through third-party tools and software. And here’s the bad news. Supply chain attacks that allow hackers to target large numbers of organizations simultaneously are on the rise. Supply chain attacks increased by 26% from 2022 to 2023. A combination of incomplete vendor security protocols and inconsistent compliance, lack of employee training, and other factors leave businesses vulnerable to nefarious attackers.

Do I really need to worry about vendor security?

Supply chain attacks and other techniques that target organizations through third-party apps and vendors are prevalent for several reasons.

Almost every company uses third-party tools and software. When it comes to vendor security, there is a widespread misconception that vendors have adequate security controls in place and that their default settings are secure. As a result, organizations fail to thoroughly vet vendors or reconfigure their tools and software settings, a common mistake when it comes to vendor security. Finally, some companies conveniently ignore red flags and create security exceptions for vendors they wish to do business with.

Shadow IT also contributes significantly to vendors’ security risk management needs. When a company’s employees start using software from unvetted vendors on their own, without oversight or approval from the IT department, it’s shadow IT.

Shadow IT issues typically boil down to two issues. One is a lack of employee education on why shadow IT is a problem, and the other is substandard vendor security management programs and inefficient vendor approval processes.

For example, let’s say your human resources department wants to communicate using Slack, but it takes a month to get formal approval. What happens next? Such an employee may decide to set up a personal Slack account (rather than a more secure corporate account) and start sharing company data through the insecure platform. It’s a vendor security breach waiting to happen.

Four steps to smart vendor security management

Organizations should focus on the following action items in 2024 to protect themselves from attacks through third-party apps and services. Of course, the more mature an organization’s vendor security program is, the more likely the risk will be minimized.

Strengthen vendor security management programs. Enterprises need a strong zero trust vendor security management program that covers the entire vendor lifecycle, from vendor setup to vendor retirement. Organizations often perform due diligence at the beginning of a vendor contract, but ignore regular monitoring during the contract and retirement after the contract ends.

Why is this important? Just because an application or software passes a security test the first time doesn’t mean it hasn’t been modified to open loopholes for hackers. (Case in point: SolarWinds data breach via software update.)

BlueVoyant’s 2023 State of Supply Chain Defense found that fewer than half of organizations regularly monitor their supply chain vendors. Given the growing threat of supply chain attacks, this number should approach 100%.

Outline clear security expectations for your vendor and include them in your contract. At a minimum, organizations should request a formal service level agreement (SLA) from any vendor that specifies cybersecurity requirements and expectations. The SLA should cover rules for data access, data management and use, as well as necessary steps in the event of a problem and penalties for non-compliance.

Next, organizations should annually review vendor security audit reports, such as SOC 2 reports, which evaluate how well the vendor is protecting the company’s sensitive information.

Design a risk-based approach to cybersecurity. A common mistake organizations make when it comes to vendor security management is applying the same processes and rigor to all vendors. Instead, companies should take a risk-based approach, weighing the vendor’s risk against the sensitivity of the data they access, and vetting vendors accordingly.

To assess the risks associated with vendors, ask the following questions: What kind of data do you share with vendors? What happens if that data is lost or compromised? • Who needs to be notified: the customer, the state, the federal government, the SEC?

In other words, the sensitivity of the data and the potential impact if that data is compromised should guide the vendor’s security controls.

Educate employees about cybersecurity and vendor risks. Employee training is a common weak point in corporate cybersecurity programs. Companies with independent operations groups (which often means shadow IT) specifically educate employees on vendor security and the processes required to vet and monitor all third-party tools and software providers. Educational programs need to be put in place.

Employees should be familiar with all the reasons why shadow IT is a problem, such as increasing the potential for data breaches and compliance issues, as well as the list of approved vendors and solutions at their disposal. The SolarWinds data breach is just one example of how hackers target organizations through third-party vendors.

Simply put, businesses cannot afford to be complacent with their vendor’s security controls. By prioritizing the above action items, organizations can protect themselves from costly data breaches that can harm customers, revenue, and reputation.

follow me twitter Or LinkedIn. check out My website and other works can be found here.

I’m the CEO and co-founder of Centric Consulting. Centric Consulting is a business and technology consulting firm founded nearly 25 years ago as a mostly remote company focused on enabling employee and customer well-being. In my new book Office Options: How to build a connected culture in virtual teams, Unpack everything we’ve discovered about building a collaborative team culture in a virtual environment. We also frequently share our expertise across a variety of mediums on topics such as business from anywhere, leadership, innovation, company culture, remote work, the future of work, and what’s next for collaboration and connectivity.

read moreRead more





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSpectrum Free WiFi for Students
Next Article 5G standalone trial makes TUS Athlone the most connected campus in Ireland
5gantennas.org
  • Website

Related Posts

Crypto Markets Rise on Strong US Economic Data

August 29, 2024

Microsoft approves construction of third section of Mount Pleasant data center campus

August 29, 2024

China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

August 29, 2024
Leave A Reply Cancel Reply

You must be logged in to post a comment.

Latest Posts

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024

Crypto Markets Rise on Strong US Economic Data

August 29, 2024
Don't Miss

Apple focuses on 6G for future iPhones

By 5gantennas.orgDecember 11, 2023

iPhone 15 Pro and Pro MaxWith Apple’s recent listing of cellular platform architects to work…

All connectivity technologies will be integrated in the 6G era, says Abhay Karandikar, DST Secretary, ET Telecom

January 31, 2024

5G-Advanced and 6G networks require additional spectrum

January 24, 2024

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to 5GAntennas.org, your reliable source for comprehensive information on 5G technology, artificial intelligence (AI), and data-related advancements. We are passionate about staying at the forefront of these cutting-edge fields and bringing you the latest insights, trends, and developments.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Most Popular

Global 5G market expands to 1.6 billion users

January 23, 2024

Verizon Business expands private 5G in Port of Virginia with NIT’s new network | News Release

November 16, 2023

Verizon Business Provides Private 5G Network to Rocklahoma Music Festival | News Release

August 30, 2023
© 2025 5gantennas. Designed by 5gantennas.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • About Creator

Type above and press Enter to search. Press Esc to cancel.