December 3, 2024 By Nimrod Iny 2 min read

A recent IBM Cost of a Data Breach report reveals a startling statistic: Only 42% of companies discover breaches through their own security teams. This highlights a significant blind spot, especially when it comes to external partners and vendors.

The financial stakes are steep. On average, a data breach affecting multiple environments costs a whopping $4.88 million. A major breach at a telecommunications provider in January 2023 served as a stark reminder of the risks associated with third-party relationships. In this case, attackers exploited vulnerabilities in a third-party vendor’s access, exposing the personal information of over 40 million customers.

Why is data protection such a challenge?

In 2022, 20% of data breaches were linked to third parties, contributing to even greater financial losses due to reputational damage and business disruption. Threat actors often target third-party vendors because of the vast amounts of sensitive data they manage. Managing third-party risk can be incredibly difficult due to limited visibility into vendors’ security practices.

While cybersecurity firms can conduct assessments of potential partners’ security posture without their direct involvement, organizations face considerable hurdles in understanding who has access to what data. Determining which vendors have read or write permissions to sensitive information is a complex and time-consuming task. Manual processes and siloed data often get in the way of effective vendor assessments.

Can a DSPM solution help?

Data security posture management (DSPM) offers a proactive approach to reducing third-party risks. By providing greater visibility into vendor access and permissions, DSPM allows security teams to:

  • Streamline vendor assessments, making it easier to evaluate third-party access to sensitive data
  • Generate live reports, keeping governance, risk and compliance (GRC) and security teams updated with real-time insights into vendor access levels
  • Enhance security by identifying and mitigating third-party risks before they become a costly problem

What about compliance risks?

Third-party breaches often carry significant compliance implications. A key concern is shadow data — data organizations don’t even know exists. In fact, 35% of breaches involve shadow data, which complicates tracking and protection efforts. The spread of data across multiple environments, a condition present in 40% of breaches, further intensifies this challenge. As a result, breaches involving shadow data are 16% more costly and take longer to identify and contain.

To address these compliance risks, more organizations are turning to DSPM solutions. By offering continuous visibility into data access and usage, DSPM helps companies maintain compliance with regulations such as the EU General Data Protection Regulation (GDPR), the US Health Insurance Portability and Accountability Act (HIPAA) and the Payment Card Industry Data Security Standard (PCI DSS). DSPM tools enable organizations to quickly and efficiently identify and remediate potential violations, particularly those arising from third-party breaches, helping to safeguard sensitive data and comply with regulatory obligations.

Take control of third-party data access with IBM’s Guardium DSPM. This solution offers unique features designed to address the complexities of modern cloud environments:

  • Visibility into vendor connections and permissions: understand exactly which vendors are connected to your cloud environments and the level of access they have.
  • Identification of high-risk vendors: quickly identify vendors with access to sensitive data.
  • Proactive vulnerability testing: use public vendor certifications to simulate potential vulnerabilities and test for unauthorized access attempts.

The critical challenge of keeping third-party data safe

In today’s fast-evolving business world, third-party risk management isn’t optional — it is a necessity. The financial and reputational costs of a breach are simply too high to overlook.

IBM Guardium DSPM provides the tools you need to regain control over third-party risks. By offering clear visibility, simplifying assessments and proactively detecting vulnerabilities, IBM Guardium DSPM helps organizations protect their sensitive data and maintain the trust of their customers.

Sign up for 30-day trial

More from Data Protection

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

SpyAgent malware targets crypto wallets by stealing screenshots

4 min read - A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices.Here's how to dodge the bullet.Attackers shooting their (screen) shotAttacks start — as always — with phishing efforts. Users receive text messages prompting them to download seemingly legitimate apps. If they take the bait and install the app, the SpyAgent malware gets…

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

3 min read - As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM's 2024 Cost of a Data Breach report. This underscores the need for robust IT security regulations in critical sectors.More than just a defensive measure, compliance with security regulations helps organizations reduce risk, strengthen operational resilience and enhance customer trust.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today