Wednesday, November 25, 20:29
Home security NCSAM: Third-party companies are a risk to your business - Protect yourself!

NCSAM: Third-party companies are a risk to your business - Protect yourself!

third-partyOctober left two days ago. However, it is worth saying something about this month. For many years, October has been established as the her month security at cyberspace. In cybersecurity, October is connected to National Awareness Month (NCSAM). This is a joint effort by government and industry for information and awareness raising users and corporate cyber security issues. The message of this year's NCSAM was «Own IT. Secure IT. Protect IT ». However, it did not only refer to business owners. Includes third-party Companies, partners, which can often be targeted hackers, who want to hit bigger companies.

In most cases, companies have limited or no control over the way in which companies co-workers they provide the IT infrastructure, their data, etc. However, this can put them on risk companies. Hackers can attack affiliates to target larger companies. This can cause loss of money and reputation.

Companies should educate and inform both staff and third-party companies about cyber risks.

What should companies do to protect themselves?

  • Create a central repository for relationships with third-party companies. To ensure that you stay protected and evaluate the potential risks, you need to know exactly the third companies you have worked with or have previously worked with.
  • Separate your network. Your partners don't have to access throughout network you.
  • Adopt some basic cybersecurity practices when finishing a partnership. This is something that many companies forget. When a partnership ends, the ability of third parties to access critical systems must also be terminated. This procedure is necessary to limit the risks. If a hacker breaches them systems your partner will be able to access your systems as well.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


Mac: How to disable Favicons in Safari

Apple has decided that in Safari 14.0 and later versions it will display the favicons on the tabs. You do not like this ...

Android: How to enable dark mode

Dark Mode is a function in mobile and desktop operating systems that changes the user interface to a dark background. Many...

How to turn off the "Meet Now" feature in Windows 10

Earlier this year, Microsoft added Skype "Meet Now" to Windows 10 previews and ...

NCSC: Fix CVE-2020-15505 RCE Critical Error on MobileIron Platform

The National Cyber ​​Security Center of the United Kingdom (NCSC) issued a warning yesterday, urging all organizations to correct the critical ...

For the first time since the Middle Ages, on December 1 Jupiter-Saturn coupling

Jupiter and Saturn are going to align in a way that has not been done since the Middle Ages, astronomers say. When the...

Ransomware attacks have boosted Coalition revenue

Ransomware attacks, which encrypt a computer files and demand ransom for their decryption, have seen a dramatic increase in ...

The new version of Stantinko malware appears as an Apache web server

Stantinko, one of the oldest malware botnets, has updated its Linux malware, upgrading its trojan to appear as ...

Peatix user data has been leaked

One of the most popular events organizing applications, Peatix, was attacked, with a hacker leaking this month the ...

The M1 Macs can run six external monitors with DisplayLink

YouTuber Ruslan Tulupov states that it is possible to run up to six external screens from the M1 Mac mini and five ...

New WAPDropper malware infects Android devices for WAP scams

Check Point security researchers have discovered a new Android malware, which is used in attacks against users in Southeast Asia (mainly). New...