NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
June 24, 2016

Third-Party Vendor Security Risks: 4 Stats You Need to Know

Justin Fimlaid Justin Fimlaid

For many companies, the use of third-party vendors is an afterthought. After all, every company uses them, whether it be for a payroll service or some type of marketing platform. However, just because the use of third-party partners is widespread doesn’t mean that their networks are secure.

Too many companies are being left in the dark when it comes to third-party security and only realize their mistakes once it’s too late.

 

Here are 4 statistics you need to know about third-party vendor security risks:

 

1. Vendors are accessing your network more than you think

On average, 89 vendors are accessing a company's network every week, according to a study by Bomgar. Without proper security guidelines and thorough assessments, this frequent access is an opportunity for disaster.

 

2. Security breaches attributed to third-party partners are increasing

According to PwC's Global State of Information Security Survey, the number of data breaches attributed to third-party vendors increased by 22% since 2015. Our best guess is that this rise in third-party security breaches is directly related to the increasing number of third-party vendors per company. Companies are taking on more partners, but are not properly assessing their third-party vendor security risks.

 

3. Guidelines are a must

Only 52% of companies have security standards for third-parties, according to PwC. Remember, your third-parties have access to confidential data, and your company is responsible for whatever happens to that data. It's important to have guidelines for both your company and your vendors to maintain a positive (and secure!) partnership.

 

4. Security breaches are more than just an inconvenience

In addition to the financial loss that companies experience after a security breach, companies are subject to significant reputational damage, according to PwC. It's not hard to figure out why - customers lose trust in your brand if their personal information is put at risk. Although security guidelines for third-parties can be remediated, public opinion cannot - at least not very easily. Prevent damage to your organization's finances and image by identifying third-party vendor security risks before a devastating breach.

 

Now what?

Now that you’re aware of the third-party vendor security risks, where to go from here? Start by managing and evaluating the security posture of your vendors to be made aware of all risks. Contact NuHarbor Security to evaluate and manage your vendors worry-free.

 

Third-Party Vendor Management

Paul Dusini is the Information Assurance Manager for NuHarbor Security.  He has more than thirty years of experience helping organizations successfully and safely use information systems to support business goals.  He is an experienced CIO and Risk Manager and is certified in security management (CISM) and risk management (CRISC).

Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Advisory and Planning 3 min read
Why your company needs third-party vendor management services Read More
3 min read
5 Disturbing New Cybersecurity Risks for the Healthcare Industry Read More
Security Operations 3 min read
4 Ways to prevent data breaches in the retail industry Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.