Page 89 - Cyber Defense eMagazine forJune 2021
P. 89
Evaluating Third-Party Security Practices
As it stands today, third-party vendor management is not easy. Only now are companies realizing that it
should be the security and technology teams, not legal and procurement departments, that are the ones
responsible for managing vendor access. And when that responsibility shifts, IT departments find
themselves overwhelmed — suddenly managing upwards of 500 vendors.
Adopting a third-party vendor management platform can simplify the otherwise herculean task of taking
inventory of third-party access, setting network permissions, and monitoring activity by consolidating into
a single place. This, in turn, makes it easier to not only keep track of who has access, but also implement
new security procedures.
Instead of just giving a new vendor access, crossing your fingers, and hoping for the best, a third-party
management solution can offer the transparency and security to know you’re protected against potential
breaches.
With more and more hackers targeting third-party vendors, signed contracts, strong reputations, and
compliance checklists just aren’t enough anymore. Thankfully, the systems to make vendor management
easier and more secure are out there — it’s now just a matter of deciding to put resources behind one.
Read the report, "A Crisis in Third-party Remote Access Security", here.
About the Author
Joe Devine is the CEO of SecureLink, a leader in third-party remote access.
Headquartered in Austin, Texas, SecureLink provides secure third-party
remote access for both highly regulated enterprise organizations and
technology vendors. Joe has been at the company since 2008, and previously
held the role of president and chief operating officer.
Joe can be reached online via LinkedIn:
https://www.linkedin.com/in/joemdevine/ and at our company website:
https://www.securelink.com/
Cyber Defense eMagazine – June 2021 Edition 89
Copyright © 2021, Cyber Defense Magazine. All rights reserved worldwide.