According to a recent study from Soha Systems, nearly two-thirds of all data breaches (63 percent) result not from direct outside penetration of organizations’ own networks, but from attacks launched on or through third-party vendors. This not only makes third-party security the leading security challenge facing organizations, but it also means that the competition is not even close. Securing third-party vendors is particularly difficult because of two specific factors: one intrinsic to the modern web, the other driven by its rapid evolution.

The Third-Party Security Challenge of an Interconnected World

The first of these factors is that third-party threats inherently require a collaborative response involving both organizations and their vendors. The second complicating factor is that decision-makers have not yet caught up to this reality.

As Michael Patterson recounted on Infosec Island, the Target breach first called widespread attention to the full scope of the third-party security threat. Attackers compromised a vendor and used it to break into “Target’s internal network for electronic billing, contract submission and project management.” In turn, they gained access to the point-of-sale system and thus to information on some 40 million customer accounts.

The Yahoo attack told the same story on even a larger scale, with more than 1 billion accounts compromised, evidently by an attack on a third-party vendor. Yahoo reported no evidence of a direct penetration of its own network.

The avenues for such third-party attacks are multiple and growing. Organizations call upon vendors to provide a growing range of services, while employees bring their personal devices — and all of those devices’ app providers — into the workplace. Contractors and other guests may need internet connections or even temporary access to the local network. Business units create their own shadow IT operations, usually relying heavily on cloud and other vendor services.

Leadership Awareness Lag

For the most part, those connections are inevitable, built into the structure of modern business and organizational computing. Security professionals are widely aware of this third-party security challenge. The Soha Systems survey found that 75 percent of security professionals regarded vendor issues as serious and growing, while 56 percent of all respondents had “strong concerns” about securing or controlling their own third-party access.

But in the same survey, only 2 percent of top level “enterprise IT and security managers, directors and C-level execs” regarded third-party access as a top priority. In short, professionals are well aware of the challenge, but this awareness has not yet reached top decision-makers.

The current security thinking is, as Patterson put it, “the belief that malware of one form or another is always on the network.” This awareness must extend to third-party vendors, and organizations need to collaborate in the process of monitoring for abnormal traffic patterns. But for security collaboration to be effective, it must be supported from the top, by leadership that recognizes the collaborative nature of effective security in an interconnected world.

Listen to the podcast series: Take Back Control of Your Cybersecurity now

More from Network

X-Force Identifies Vulnerability in IoT Platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

4 min read

Cybersecurity in the Next-Generation Space Age, Pt. 4: New Space Future Development and Challenges

4 min read - View Part 1, Introduction to New Space, Part 2, Cybersecurity Threats in New Space, and Part 3, Securing the New Space, in this series. After the previous three parts of this series, we ascertain that the technological evolution of New Space ventures expanded the threats that targeted the space system components. These threats could be countered by various cybersecurity measures. However, the New Space has brought about a significant shift in the industry. This wave of innovation is reshaping the future…

4 min read

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

4 min read - Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

4 min read

Cybersecurity in the Next-Generation Space Age, Pt. 2: Cybersecurity Threats in New Space

7 min read - View Part 1 in this series, Introduction to New Space. The growth of the New Space economy, the innovation in technologies and the emergence of various private firms have contributed to the development of the space industry. Despite this growth, there has also been an expansion of the cyberattack surface of space systems. Attacks are becoming more and more sophisticated and affecting several components of the space system’s architecture. Threat Actors' Methodology Every space system architecture is composed of three…

7 min read