Keep Your Third-Party Vendors Close

February 02, 2017//Tori Taylor

Last Updated: June 13, 2022

The next big data breach could hit your network through a third-party vendor—do you know who you are doing business with?

Depending on the size of your business or organization, you may be working with third parties at multiple operational levels. Business partners, maintenance providers, and even take-out restaurants can leave your valuable network at risk.

The 2013 breach of Target near the Christmas holiday occurred through the compromised credentials of a heating and air-conditioning vendor. With the addition of any third-party vendors to your organization, your risk management burden increases. Consider that a major supplier of yours is served by a network of vendors. When the supplier is added to your platform, anyone with access to their network could prove a security risk.

In a regulated industry, your organization is responsible for compliance. This means identifying vendors and formalizing best practices to ensure all parties understand the requirements and risks.


SecureLink | Vulnerable Vendor Checklist

Vulnerable Vendor Checklist

Our checklist helps you identify possible red flags so you can take steps to protect your network from cyberattacks and other threats to your data that stem from vendors’ access.


In guidance offered by PwC, the steps to effective risk management include:

  • Before contracting with a supplier or service vendor, perform a background check and appropriate due diligence to confirm the vendor is solvent and capable of assessing and addressing threats
  • Prepare contracts that reflect the risk and compliance requirements for vendors, and their workers or sub-contractors
  • Define the internal personnel responsible for obtaining and maintaining compliance information and obtaining certifications and risk audits

Be sure to standardize the definitions and procedure around onboarding vendors and business partners throughout your organization. Identify the points of vulnerability and use a secure platform to ensure compliant access management.

Vendor risk management remains active throughout the lifecycle of a vendor with your company. Whether you work with only a few vendors, hundreds, or thousands, your network is only as safe as the security practices of your weakest partner. Know your third-party vendors—and know what they are doing to protect your organization from threats.

Read this powerful customer story to learn more about how one prominent healthcare provider now has a standardized method for controlling vendor access.

About SecureLink

Our sole focus is secure third-party remote access. For highly regulated enterprise organizations, SecureLink Enterprise has pioneered a secure remote access platform. SecureLink for enterprise allows an organization to identify, control, and audit third-party vendors. For vendors, SecureLink is the gold standard remote access support platform because it is easy, efficient, and ensures compliance and reduces liability when supporting customers.

close close