Managing Third-Party Vendor Cybersecurity Risks (Part II of III)
We all know that businesses rely on a large number of third-party vendors to support their business operations. Many of these third parties require access to a company’s data and its internal information and technology systems. This digital fact of life creates a real cyber risk for illegal intrusions. Over half of all cyber-attacks are the direct or indirect result of third party access. Third-party...