Click me
Transcribed

Third-Party Remote Support Threats

THIRD-PARTY REMOTE SUPPORT THREATS "A firm's level of cybersecurity is only as good as the cybersecurity of its vendors." Benjamin M. Lawsky, New York State's first Superintendent of Financial Services of 450 data breaches 63% studied were linked to a third-party component of IT system administration Vendor Access Process Risks 50% of IT professionals feel unprepared conducted an inventory of all third parties that handle personal data of employees and customers do not perform risk assessments on third- party vendors (up from 47% in 2013) Personnel Risks 9% 15% 42% believe their of security leaders name CPO as top strategic partner organizations are "well prepared" for a security breach don't feel they have the right skills and capabilities to prevent breach COMMON EXPLOITS Virtual Private Network (VPN) Desktop Sharing ADMIN ***** Vulnerabilities Vulnerabilities Shared credentials / Privileged accounts Easy target for Hackers Limited Audit and Accountability Full network access / credentials 80% Microsoft of all targeted cyber attacks exploit privileged accounts during the attack process webex of the network managers who allow VPN access state LogMeln 2/3 their vendors can access "Backoff" (POS malware) department-specific business applications (i.e. database software, accounting software) 1000 infections of businesses NOTABLE BREACHES that originated from stolen third-party credentials or the exploitation of desktop sharing tools used for third-party remote support. DQ SUBWAY THE goodwill HOME September 2014 November 2013 July 2014 October 2014 May 2011 56,000,000 Credit Cards 40,000,000 Credit Cards 868,000 Payment Cards 216 150 Locations Locations The Future of security leaders strongly agreed that the risk level to their 62%%) organization was increasing due to the number of interactions and connections with customers, suppliers and partners. About SecureLink Sources: O IBM CISO Assessment, 2014 ® Trustwave Global Security Report, 2013 O CyberArk All Access Pass, 2014 O Spiceworks Voice of IT Panel - VPN Survey O Gartner: 2014 CIO Agenda ® EIQ Networks Survey, 2014 O PWC Global State of Information Security Survey, 2015 Businesses rely on the SecureLink platform to bridge the gap between enterprise technology vendors and their customers. The Securelink solution streamlines support operations and reduces liability for vendors while ensuring security, accountability, and compliance for their clients. Recognized as experts in third party vendor access and remote support, SecureLink serves more than 30,000 organizations globally. Founded in 2003, the company is privately owned and based in Austin, Texas. SecureLink, Inc. 12600 Hill Country Blvd. Suite 20O, Austin, TX 78738 ofc: 512.637.8700// fax: 512.637.8701// securelink.com ..--- DEPOT

Third-Party Remote Support Threats

shared by sarah-j-g on Jul 16
107 views
1 share
0 comments
Outsourcing IT components carries a certain degree of risk if service providers do not implement all the necessary security standards. The infographic by SecureLink contains a set of important facts ...

Writer


Category

Business
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size