Site icon Datafloq News

Control Your Data: How Endpoint Security Prevents Third-Party Breaches

There’s a dark side to outsourcing business services.

Beyond the advantages of cost efficiency and flexibility, outsourcing comes with inherent security risks. Investing heavily in securing your in-house network isn’t enough. One misstep when working with a third-party service provider can give attackers direct access to your most sensitive data regardless of your perimeter defenses.

According to a 2018 Ponemon Institute study, 59% of companies have experienced a third-party data breach. And in light of this fact, 51% of CISOs now see the failure to control third-party data usage as a major security concern.

When collaborating with third-party service providers, you need a way to maintain control of your sensitive data. With proper endpoint security, you can control access and mitigate the risks of a third-party breach.


Learning from major third-party data breaches

In 2013, in one of the largest data breaches of all time, retail giant Target’s systems were compromised as a result of credentials stolen from a third-party HVAC vendor.

The stolen credentials gave attackers access to the HVAC vendor’s billing, contract submission, and project management platform. This level of access helped attackers compromise the HVAC vendor’s VPN credentials for Target’s network. And, as a result, the attackers were able to remotely access Target’s network and deploy malware that infected tens of thousands of point-of-sale devices to steal customer credit card information.

In 2017, Target reported that the breach cost the company $202 million. And looking back, research shows that this was a preventable attack.

Krebs on Security wrote that a Verizon assessment conducted between December 21, 2013, to March 1, 2014, notably found no controls limiting [third-party] access to any system, including devices within stores such as point of sale (POS) registers and servers. Had the right access controls been in place, we might not be talking about the 2013 Target data breach today.

In the wake of massive data breaches, it’s easy to fall into the it’ll never happen to me mindset. While few attacks approach the size of the 2013 Target incident, Ponemon’s 2018 Third-Party Data Risk study shows the percentage of companies facing third-party data breaches has only risen over the past few years. Third-party data breaches cost SMBs an average of $120,000 per incident in 2018–up 36% from 2017–while enterprises forked out an average $1.23 million per breach–a 25% increase from the previous year.

Among the victims of a major third-party data breach in 2018 was the Universal Music Group (UMG). In June of that year, the global music corporation was working with a contractor to move its IT infrastructure to the cloud. While managing UMG’s IT infrastructure, the third-party contractor forgot to add a password to one Apache Airflow server, a slip up that had dire consequences. Because Apache Airflow doesn’t use authentication by default, UMG’s cloud data storage and FTP credentials were left completely exposed to the public internet.

Until companies change their approach to third-party risk management, attacks like these will continue. To mitigate these risks, you need an endpoint security strategy that covers more than just your internal network.



Remote access control ‘your key to avoiding third-party breaches

From the moment you give third-party vendors access to your data, your network’s safety becomes dependent on the strength of their security. Even a simple vulnerability like password mismanagement can give attackers the foothold they need to launch a multi-million-dollar data breach against your company.

Addressing third-party risk requires a holistic security strategy–one that covers both your internal network and coordinates with the third-parties you rely on.

Simply deploying anti-malware and hoping for the best isn’t enough. Adopting a zero-trust model that requires every user and every device to be verified is a good first step. Embracing the zero-trust mindset means putting strict access controls in place to ensure third parties can’t put your data at risk.

Remote access solutions can help you balance the benefits of outsourcing with your zero-trust security model. Implementing access controls that limit third-party data breaches requires:

Remote access solutions should be rolled into every modern endpoint security strategy. Even with the most advanced cybersecurity systems protecting your internal network, mismanaged third-party access can result in debilitating data breaches.

Learn from the likes of Target, UMG, and other victims of third-party breaches. Put remote access control and proper endpoint security in place so you can outsource safely.

Exit mobile version