Search
  • Adam Adler

Adam Adler: " Third-Party Cyber Risk Can Be Lethal for your Organization. TRUST NOBODY! ".


https://www.digitalbank.capital/



Adam Adler ( Miami, Florida): You aren’t taking third-party risk seriously


The weak link in your enterprise security may actually be your partners and suppliers. Supply chain attacks, also called value-chain or third-party attacks, occur when someone infiltrates your system through an outside entity that has access to your systems and data.


A combination of supply chain complexity, increased cloud storage, new data privacy regulations, remote work, and rising cyberattacks have created the perfect storm for third-party cyber risk—and the numbers bear this out.


56 percent of organizations have had a breach that was caused by one of their vendors. Meanwhile, the average number of third parties with access to sensitive information is increasing.


In response, regulators are increasingly looking at third-party risks. Last year, New York State financial regulators began requiring financial firms with a presence in New York to ensure that their suppliers’ cybersecurity protections were up to par. Next year, Europe will do the same, with its GDPR, which applies to any company that collects personal information from Europeans and comes with steep fines for non-compliance—up to 4 percent of total global revenues.


To protect your company and avoid any penalties, you will need to closely vet the security of the companies you do business with, within 2021, align your security standards, and actively monitor third-party access.


According to a recent Gartner report, the median organization contracts with 5,000 third parties. In addition, 72% of compliance leaders expect that number to increase by 2022.


The ramifications of these numbers are consequential because working with third parties increases an organization’s attack surface, which leaves it more vulnerable to cyberattacks through third parties. Bottom line? The more third parties you work with, the greater the cyber risk.


COVID-19 has resulted in increased cyberattacks.


Cyberattacks have increased significantly in the wake of coronavirus. According to Zscaler, in March alone, there was a 30,000% increase in COVID-19 related attacks and malware.


Many of these attacks exploited the “new normal” of businesses working from home, with far less security in place than at the office. In fact, 51% of companies experienced more phishing attacks due to employees working remotely (Barracuda).


Small supply chain partners have been particularly vulnerable to such attacks because they often lack the necessary security know-how and human resources.



https://www.digitalbank.capital/


Third-party vulnerabilities are being exploited.


According to a recent Gartner report, the majority of data breaches and cyberattacks exploit third-party cyber gaps. The report found that in 2019, 44% of companies experienced a significant data breach through a third-party vendor. (Source: “Procurement on the Front Lines: New Trends in Data Privacy and Cybersecurity Risks,” May 26, 2020.)


Similarly, Deloitte reported that 83% of organizations experienced a third-party incident in the past three years, with 11% causing a severe impact on customer service, financial position, reputation, or regulatory compliance.


These statistics illustrate why it’s so important to have a comprehensive third-party security management process in place that pinpoints cyber gaps and helps close them.


All types of organizations are vulnerable to third-party cyberattacks.


You might think that financial institutions are, by definition, the most secure and hence the least likely to suffer a cyberattack. However, according to Carbon Black, 33% of surveyed financial institutions said they’ve encountered island hopping, an attack where supply chains and partners are commandeered to target the primary financial institution.


This is only one example. Organizations of all sizes and from all industries are susceptible to third-party cyberattacks.


Third-party cyber incidents are more expensive and frequent.


Your organization has a lot to lose from a data breach—and it’s not just customer trust. According to the aforementioned Gartner report, having a third party involved in cyber incidents has the effect of making them both more expensive and more frequent. In fact, the report concluded that a data breach is $700,000 more expensive when a third party is involved.


Data privacy regulations are increasing and are being enforced.


One Gartner report recently pointed out that the last 12 months have seen more changes in privacy than the entire century before it. With regulations like GDPR, CCPA, the New York Shield Act, and many more, organizations are struggling to keep up and to make sure that their third parties comply as well.


These regulations are being enforced, and the penalties can be substantial. According to Help Net Security, 340 GDPR fines have been issued totaling over £150 million since May 2018—and that’s just one regulation.


Adam Adler is a Cyber Defense & Cyber Warfare Advisor, as well as Chairman of the Board for Digital Bank Vault. A long time entrepreneur with over 18 years of experience all at top-level management and ownership, Mr. Adler has focused his recent years on Cyber Security and defending our youth online. DBV has developed a proprietary encryption method that continues Adam’s mantra of “Privacy is Priceless”. DigitalBank Vault provides impenetrable defensive cyber solutions for Keyless End to End Encrypted, Peer to Peer, mobile, and computer communications. Adam and DigitalBank Vault have constructed new & disruptive cyber defense technologies to solve many privacy issues commonly found online and defend against unwanted intrusion.

TRANSFORM ANY CELLULAR DEVICE INTO A
SURVEILLANCE FREE SECURE PHONE: CLICK HERE 

With the DigitalBank Vault Encryption System, you can now transform any Android Device

into a Government Grade Encryption Platform. 

The best advice is to buy a fresh new Android smartphone, without inserting any Sim card, just connect it to the net, download the DigitalBank Vault Encryption System, and one more email app such as Protonmail, and you are set to go. 

 

This dedicated Android device should remain always offline, and you connected it to the internet only and exclusively for importing or exporting already encrypted files. 

 

All the encryption and decryption process must happen offline. 

The moment the files are encrypted, you can then get connected and send the encrypted file through Protonmail or other apps we will recommend you. 

If properly used, you have in your hands a powerful encryption platform that is at the same level as the top classified encryption systems used by Governments and Armies. 

 


 

©2019 by DigitalBank Vault Limited.