January 05, 2015//Tori TaylorLast Updated: June 16, 2021
The most powerful statement of 2014 regarding cybersecurity was made in October by Benjamin M. Lawsky, New York State’s top financial regulator. In the wake of several devastating data breaches, Mr. Lawsky wrote a letter to the nation’s top banks in an effort to address major vulnerabilities.
“It is abundantly clear that, in many respects, a firm’s level of cybersecurity is only as good as the cybersecurity of its vendors.”
This assertion speaks to all sectors, not just finance. Advancements in network security products have made it difficult for unauthorized individuals to access enterprise systems directly. The new way in is through privileged partners. Enterprise technology vendors (retail, hospitals, casinos, banks, energy providers, government agencies) are typically provided network credentials to remotely support their customers.
Remote support is absolutely necessary as technology improves, but the most commonly used methods of connection – VPNs and desktop sharing tools – are not secure for third-party access. It is this vulnerable vendor connection that is being highly exploited by hackers. Handing over the keys to the kingdom to every technology partner is no longer an option in this post – “Year of the Breach” world.
The infographic below illustrates the threats all technology providers and enterprise network security professionals need to be aware of as they address methods of secure remote support connections.
Request a demo today to see third-party remote support software in action.