Third-party vendors are often the weak link in the cybersecurity fence. From the HVAC company with unfettered access that caused the infamous Target breach to the sound editing company that caused Netflix show Orange is the New Black to be leaked, vendors can cause a lot of damage. A 2013 study by digital security company Trustwave found that third parties were responsible for 63 percent of breaches.
FIs often think of vendors as trusted partners that give them the resources to accomplish things they couldn’t do on their own. While this can be true, that trust can’t be built on faith alone. FIs must take action to limit third-party risk, particularly when a vendor has access to the FI’s customer data or systems. Regulators have a lot to say on the topic (Fed, FDIC, OCC, NCUA), but it essentially boils down to three key steps:
The WannaCry Ransomware that infected more than 300,000 machines across the world earlier this month is yet another reminder of the importance of strong cybersecurity, including software patches and updates.
While machines running updated versions of Microsoft were protected from the bug, those that didn’t automatically update software or, worse yet, operated Windows XP, a legacy product Microsoft stopped supporting two years ago, were in danger. The attack encrypted the user’s data and demanded a ransom payment to get the information back.
The good news is that few institutions in the U.S. were affected, but this may not be the case for every cyberattack. That’s why financial institutions (FIs) need to be sure to have strong cybersecurity in place—and they must be certain their vendors do the same—so that systems and customer data remain secure. Ncyber is an online version of the FFIEC Cybersecurity Assessment Tool that can help your FI get a handle on cyber risks.
Don’t wait until the next worldwide bug hits to assess the risks posed by your third-party vendors. We may have been lucky this go around, but the next attack could be more sophisticated.