Third-Party Exposure — The Risky Part Of Using Contractors

Jim Luhrs
2 min readFeb 9, 2023

--

Did you really just give them admin rights to the system?

In the world of cybersecurity, the need to secure sensitive data is a top priority for all organizations. Despite the use of firewalls, antivirus software, and other security measures, the most vulnerable points of entry are often third-party networks that have privileged access to an organization’s systems.

In 2021, we saw a major example of this with the third-party breach of Facebook, Instagram, and LinkedIn, which resulted in the leak of personal data from over 214 million accounts. The breach occurred when hackers infiltrated the network of a third-party contractor called Socialarks, who had privileged access to all three companies’ networks.

In 2022, third-party breaches are expected to become even more of a pressing threat as companies turn to independent contractors to complete work once handled by full-time employees. With the shift to remote work caused by COVID-19, over 50% of businesses are now more willing to hire freelancers, according to a 2021 workforce trends report by Upwork.

The problem with this trend is that 96% of organizations grant these external parties access to critical systems, creating a potentially unprotected access route for hackers to exploit. This presents a significant challenge to organizations and highlights the importance of strengthening third-party security measures.

One way to fix the issue is by implementing more strict security protocols for third-party contractors, including mandatory background checks, password requirements, and access control policies. In addition, organizations should regularly monitor their third-party networks to ensure they are secure and that no unauthorized access is taking place.

Another important step is to educate all employees on the importance of security and the dangers of third-party breaches. This includes regular training sessions and emphasizing the importance of being vigilant when granting third-party access to sensitive systems.

The rise of remote work has resulted in an increased reliance on third-party contractors and networks, making them a prime target for cybercriminals. To protect their data, organizations need to take proactive steps to secure their third-party networks and to educate their employees on the importance of cybersecurity. By taking these steps, organizations can reduce the risk of third-party breaches and ensure the safety of their sensitive data.

--

--

Jim Luhrs
Jim Luhrs

Written by Jim Luhrs

Web3, Startups, AI & all things tech. Based in Christchurch, New Zealand. Founder of a Web3 startup and passionate about supporting local

No responses yet