Insider and Third-Party access have been found to be the top cyber threats for global organizations according to Bomgar’s 2017 Secure Access Threat Report. The report also finds that many organizations still allow a variety of internal and external parties unsecured privileged access to critical systems and data. Chris Olson, CEO at The Media Trust commented below.
Chris Olson, CEO at The Media Trust:
“The risks of third-party vendors in the enterprise IT environment cannot be overemphasized, especially when talking about the website. In fact, more than 75% of executing code on enterprise websites is provided by third-party vendors which operate outside the IT infrastructure. A frequent contributor of Shadow IT, enterprise websites require a host of third parties–who frequently call additional, fourth and fifth parties–to execute. The ability to identify, document and authorize these ever-changing vendors is critical to properly mitigate risk. Continuous monitoring from your customers’ points of view helps IT teams pinpoint how these vendors and their actions—specifically the domains executed and cookies dropped— change according to user geography, browser, or device. Collecting this type of vendor intelligence provides clear insight into third party behavior to protect customers and brand reputation from cyber threats.”
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.