Category Archives: Third Party

Supply Chain Hacking

No matter how robust your internal cybersecurity strategy is, your supply chain could be your weakest [and most costly] link. In a new string of targeted attacks, attackers will target the most vulnerable part of a supply chain to reach their intended victim. This specific hacking operation, known as Tortoiseshell, targets IT providers with malware. […]

Read More

Third Party Due Diligence Could Prevent Your Next Cyber Breach

Cyber risk is often unaddressed in the due diligence process of vetting or monitoring a third party. Therefore, transfer of cyber risk is an afterthought and a common blind spot. With the ease and accessibility of outsourcing core competencies, this risk continues to be a big issue. It’s not enough to strengthen your own cybersecurity […]

Read More