Would You Trust Your Vendors to Protect You From a Cyberattack?

Would You Trust Your Vendors to Protect You From a Cyberattack?


The marketing agency we use to design our cool promotional t-shirts is fun to work with – they have a totally hip workspace and even have a resident dog in their office. But do I trust them with the security of our business networks? Not a barking chance.

Systems, networks, and businesses are becoming more interconnected every day, and as that web of connections expands, so does the risk of cyberattack via a third party. Each time another device or network connection is added, a new threat vector is created. So, for those organizations that aren’t thinking about the potential threats created by those third-party connections, it is time to wake up that sleeping dog.

The news is littered with examples of 3rd party breaches – through an unsecured access point, with credentials that allowed too much access, malware that spread from the partner into the business network, the list goes on. It isn’t because vendors and partners are attacking each other, it is because convenient, open connections which allow companies to exchange data also become a convenient avenue for cyberattack. Third parties often have totally legitimate reasons for needing access to corporate data (why else would we do business with them?), but how they get that data is the problem, and where cybersecurity best practices need to be applied.

If we take the example of our marketing agency, they need branding information, images, color palettes, copy, and other content from us. We have all that information stored in a repository on our network, but we never let them access our repository, we send or push the data to them. The same should be true for the vendors, partners, and other third-party relationships in financial services, healthcare, critical infrastructure, and pretty much every other industry. Most hospitals, banks, and oil rigs probably aren’t looking to make funky graphical t-shirts, but they are still generating all kinds of operational data that needs to be shared with third parties; from retailers looking for customer data, to remote performance monitoring, to data aggregators seeking all kinds of market/transaction data.

The rut that everyone seems to get stuck in is the perception that these exchanges need to be two-way communications, and that networks must to be available to let outside parties in to retrieve the data they need. It doesn’t have to be that way. In fact, for many years now, in thousands of locations worldwide, data is routinely and continuously being pushed to those third parties, with no way into the business network. This is accomplished using data diode hardware-enforced cybersecurity, or similar unidirectional device.

This “data push” is actually part of the relatively recent guidance issued by the Dept. of Homeland Security (DHS) on how to protect industrial control systems, but the principles could easily be extended to pretty much every commercial market vertical. The DHS provides seven strategies which include specific guidance for protecting connections into and out of networks:

  1. Whitelist the applications (both internal and third party) that should have access to sensitive business networks and systems
  2. Reduce the overall risk to your network by reducing unnecessary connections
  3. Convert as many connections as possible to one-way out (with a data diode)
  4. Utilize one-way in transfers for patches, software upgrades, etc.
  5. For remaining two-way communications, use locked down, single port connectivity
  6. Segment your network to limit lateral movement across your business networks
  7. Develop/maintain a plan to manage and monitor authentication and implement the “least privilege” principle: restrict those who do have access to only the data and systems they need to perform job functions

Most importantly, these strategies work! The report noted that implementing these strategies would have prevented 98% of the cyberattacks reported in the previous 2 years. Those are some great numbers for the dog eat dog world of cyber threats.

The bottom line is we will inevitably need to connect with our partners, vendors, and customers to conduct business, but we should not entrust them with our cybersecurity. By using one-way only data transfer solutions (data diodes/unidirectional gateways) data can be shared with third parties while guaranteeing bad actors cannot get in.

Insights to your Inbox

Stay informed with the latest cybersecurity news and resources.

Daniel Crum Director, Product Marketing

AI’s Role in Defense – Accelerating Decision Dominance in the Next Era of Warfare

"AI is not just another technology. It is a transformative technology that will change the way we fight and defend our nation." Kathleen Hicks, Deputy Secretary of Defense   Techn...
November 26, 2024
Daniel Crum Director, Product Marketing

Hidden Threats in AI Data: Protecting Against Embedded Steganography

As the 2023 Executive Order on Artificial Intelligence (AI) specifically lays out, "Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks." On...
November 19, 2024

Owl Cyber Defense Featured on Fed Gov Today Television

Data Mobility: The Edge Advantage in Real-Time Operations Originally Broadcast on Fed Gov Today, November 3, 2024 Dan O’Donohue emphasizes that data’s power is in its mobility. ...
November 13, 2024