Blog
  • Register

Subscribe to our blog

CTN Blog

Companies Need to Keep a Vendor's Security in Mind

Companies Need to Keep a Vendor's Security in Mind

Data breaches have a tendency to destabilize relationships. With so many data-related problems befalling businesses, it is important that each side of every data-driven relationship understands their role in the protection of another organization's data. Today, we’ll take a look at the issue and how to determine if your partners are putting in the effort required to keep your data secure. 

Are Your Vendors Properly Protecting Your Information?

We’ve seen businesses have a litany of challenges protecting their sensitive data over the past several years, and as threats get more sophisticated it poses more problems. Additionally, many businesses outsource a fair amount of their operational and support efforts and that can have a negative effect on their security. 

So, how do you know that your vendors are protecting your information?

You ask them, of course. 

Before you onboard any new vendor, you should come up with a questionnaire that asks the right questions about how they handle their own cybersecurity, and more specifically (and importantly) how they go about handling your information. 

At CTN, we do this for all of our clients to ensure that they are partnering with reliable companies that, at the very least, are attempting to do the right things to protect sensitive information. 

Questions You Should Ask Your Vendors

The first thing you should consider when making up some questions to ask your vendors about security is: do you understand the answers? If you don’t know what you are doing, you could just assume any thoughtfully answered response would be sufficient. This is far from true and is a liability, especially in trying to ascertain what risk your business is facing by doing business with a company. We can’t stress enough that if you don’t have someone that knows what they are doing, you need to find someone, as this will serve you much better in times like this.

Let’s go through a couple of important questions you should ask:

  1. Do you collect, store, or transmit personally identifiable information (PII)?
  2. If so, do you store your PII onsite or in the cloud?
  3. How do you provide users access to the PII you store?
  4. Can PII be accessed remotely?
  5. Do you constantly monitor all services, systems, and networks?
  6. What regulatory bodies does your business operate under? Do you have proof of compliance?
  7. What kind of encryption do you use for data-at-rest? Data-in-transit?
  8. Do you consistently patch your software? 
  9. Do you have mobile device management and IoT management systems?
  10. Do you utilize legacy systems that aren’t supported by manufacturers?
  11. What cybersecurity tools do you use?
  12. Do you have language in your agreements about vendor cybersecurity? 
  13. How are your continuity systems?
  14. How would you go about the situation in the event of a data breach?
  15. What authentication procedures do you use? 
  16. Do you train your employees on the best practices of cybersecurity?

There are many more questions you should ask. Vetting your vendors is a great way to know if they have your best interests in mind. 

If you would like to partner with a company that not only has your best interests in mind, but also can help you ascertain if your other partners do as well, give CTN a call at (610) 828-5500 today.

Hackers Use the Pandemic to Send Out Phishing Thre...
Your Guide to the Modern Varieties of Cybercrimina...

By accepting you will be accessing a service provided by a third-party external to https://www.ctnsolutions.com/

Mobile? Grab this Article!

QR Code

Latest News & Events

CTN does not use any SolarWinds or FireEye products. As you’ve likely seen reported, SolarWinds discovered a supply chain attack compromising their Orion business software updates that distributed malware known as SUNBURST. The malware perm...

Latest Blog

The first half of this year has seen its fair share of ups and downs, especially on a global scale. With a global pandemic still taking the world by storm, it’s despicable that hackers would take advantage of the opportunity to make a quick...

Contact Us

Learn more about what CTN can do for your business.

Call us today
(610) 828-5500

610 Sentry Parkway
Suite 110
Blue Bell, Pennsylvania 19422