<img src="https://ws.zoominfo.com/pixel/PMY3ZvbpZt27ywWwZSBB" width="1" height="1" style="display: none;">

Business Copiers & Printers

EO Johnson offers multifunction copiers and printer solutions that are cost effective and easy to use. Trust in the exceptional service and rapid response time of our knowledgeable local service technicians.

Production Print & Finishing

EO Johnson is your one-stop shop for digital production presses, wide-format printing, and finishing equipment. We provide local service and support and have the most technologically advanced Customer Experience Center in the Midwest.

Locknet Managed IT

Locknet Managed IT is a Managed Security Service Provider (MSSP) that is both FFIEC-examined and SOC 2 Type 2 audited. We support businesses in Wisconsin, Minnesota, Iowa, and Illinois with technology strategies and solutions to improve your security position. 24/7/365 remote and onsite support.

locknet_logo

 

Digital Transformation Solutions

EO Johnson’s digital transformation consultants have solutions for every size and type of business. Reduce paper and secure your files with our bulk document scanning. Then streamline your business with process mapping and secured document management.

Resources

Gain insights and expand your knowledge with our collection of tools and resources. Stay informed about the latest in business technology, print services, and process improvement. 

Managed Security and Vendor Relationships

2 min read

hero_angles
Ben Potaracke

A 2016 survey by the independent Ponemon Institute, shows that 56 percent of organizations have had a breach caused by one or more of their vendors.

Yet, fewer than one in five companies, 17 percent, felt their organization effectively managed third party risks. Less than half said that managing outsourced relationship risks was a priority in their organization. That thinking has turned into a serious mistake for many.

Small businesses are soft targets.

Hackers view small to medium size businesses as less protected and a potential back-door entry to larger organizations. Last year Target paid $18.5 million to 47 states for a 2013 breach created when criminals entered Target’s system through a refrigeration, heating and air conditioning subcontractor. Yahoo also experienced a massive break-in caused by a third-party vendor.

Did the Target HVAC contractor gain back his reputation? The damage to smaller companies, with fewer resources to recover, can be devastating. Yet, more than half of companies don’t keep a comprehensive inventory of third parties that share their sensitive information—or are allowed free remote access to their network.

Also unsettling, is criminals can continue to create risks even ‘after’ vendor termination, taking advantage of patches and outdated software. Unfortunately, this is the soft underbelly—the entry point for many vendor connected breaches.

Managed security can help lift the third-party burden.

There’s a saying in the managed security industry that you’re only as secure as your ‘least secure’ contractor. Managed security can minimize the risk of hiring a third-party vendor if you can find the right one. Here are questions that can peel back their vulnerabilities and raise the red flags.

Before hiring a managed security partner ask if they:

  • Specialize in your market.
  • Are audited by a third-party organization. For example, EO Johnson Locknet completes multiple audits and risk assessments each year, including an SOC2 audit.
  • Have most of their services in-house. Fewer vendors means bringing down the number of third party vendors that will require your due diligence.
  • Will reveal what services are subcontracted.

Preventing third-party breaches means evaluating your current IT security needs.

Invite managed security companies to your site to meet. Let them put a trained eye on your current security.

Here are some questions they may ask you:

  • Does your staff have the time, expertise and resources to vet third-party vendors and do they know the warning signs of a potential vendor risk? A managed security partner is trained to look for trouble and raise the alarm.
  • Does your staff have the time and resources to keep up with all the software updates and other security maintenance? Outdated software can be an open door to your system. A partner in managed security has the know-how to keep the ‘no entry’ sign up for cybercriminals.
  • Are you monitoring your system around the clock? Cybercriminals have eyes on you 24/7 trying to crack codes and find holes to reach your sensitive data. Think of managed security as round the clock surveillance. If a middle of the night breach rears its head, the managed security provider should be working with you on it before your staff gets their morning coffee.
  • Could your in-house staff take on other job responsibilities if they knew a managed security provider was watching your network for third-party intrusions and other breach events? Many businesses have found new opportunities to use staff time when they have the flexibility to leave the cybercriminals to the experts.

Managed security can help avoid third-party vendor breaches.

Most likely you’ve done a good job vetting your primary vendors. Considering the heightened threats, it may be time to entertain the hiring of a managed security partner who can walk ‘downstream’ and make sure your primary vendors and their subcontractors can do no damage to your sensitive data, customers and your bottom line.

angle_down_right
click_Icon

angle_up_middle

No Comments Yet

Let us know what you think