Tech Wavo
  • Home
  • Technology
  • Computers
  • Gadgets
  • Mobile
  • Apps
  • News
  • Financial
  • Stock
Tech Wavo
No Result
View All Result

Fixing the Weakest Cyber Link: Third-Party Risk Steps

Tech Wavo by Tech Wavo
November 23, 2025
in Financial
0


Chris Gunner

By Chris Gunner

Third party vendors can expose financial firms to severe cyber risk. This article outlines why vendor security is business security, drawing lessons from the MOVEit breach. It proposes three steps: engage a vCISO, run rigorous vDDQ for potential vendors and suppliers and fortify backup and continuity for resilience. 

With cyberattacks and data breaches increasingly on the rise, a lot of attention is understandably going towards an organisation’s own cyber resilience and whether the company is prepared if IT systems go down. But what about a business’ third-party vendors?   

Understanding the risk an organisation takes on when partnering with third-party vendors is a critical component of having a strong security posture, because their weakest link is now that of the buying business. 

But it’s a threat that is going amiss among many organisations. The Cyber Security Breaches Survey 2025 in the UK shows that only just over one in ten businesses have reviewed the risks posed by their immediate suppliers (14%) and only 7% were exploring the risk to their wider supply chain.   

For financial organisations in particular, the threat can be even greater. With a key focus on offering bespoke financial services, firms may lack sufficient internal resources to manage their cybersecurity and therefore complete effective due diligence on a third-party vendor.   

The consequences posed by breaches to suppliers   

The risk posed by third-party breaches to buying organisations can be catastrophic. A high-profile example was the exploitation of a vulnerability in Progress Software’s MOVEit file transfer app, utilised by numerous organisations around the world. Customer and employee data was then stolen from businesses with supply chains that utilise the app.

Over the weeks following the breach, a string of high-profile organisations reported that national insurance numbers and bank details may have been taken. Ernst & Young, alongside numerous financial organisations, were also implicated in the attack. This high-profile incident paints a clear picture of the risk posed to financial institutions, and the need to take immediate action before bringing on any new suppliers.   

Step 1: Calling on the advisors 

Before evaluation of any new vendors, financial institutions need to fill any internal knowledge gaps with external expertise. CISOs are vital within businesses, with these professionals responsible for developing the overall cybersecurity strategy of their organisations. But in specialist sectors such as finance, it might be an unaffordable role to hire for.

A Virtual Chief Information Security Officer (vCISO) is an Executive-Level cybersecurity practitioner that leverages their years of experience to help financial firms develop and managed a tailored information security program. By providing guidance on areas such as incident response planning, security policies and procedures, financial firms can access the resources to complete due diligence of third-party vendors.

Step 2: vDDQ of third-party vendors

With the might of a vCISO behind them, financial firms can confidently carry out a Vendor Due Diligence (vDDQ) process. This involves the assessment and management of potential risks associated with external parties, such as suppliers, vendors or service providers. To evaluate the cybersecurity strength of a particular vendor, it might involve questions around current data protection measures, compliance with laws and regulations, current incident response plans and even the training and awareness being delivered to staff.

A vDDQ is a critical component of overall risk management and cybersecurity efforts to safeguard an organisation’s data and operations against the third-party threat, and is often required for compliance purposes as well.

Step 3: Fortify financial defences 

The vDDQ process gives financial firms the peace of mind they need to select vendors that prioritise strong cybersecurity posture, but they should still take measures to protect their own operations if a critical vendor is attacked and data becomes vulnerable to being stolen. That’s why business continuity planning should include a backup of sensitive data.

It’s true that many organisations do have cloud backups now with the big providers such as Amazon, Google or Microsoft. But a separate backup of cloud data with specialist third-party can provide the extra peace-of-mind should something happen to a vendor. Cloud backups today means that data restoration doesn’t have to be a lengthy process, so they need to be in place should the worst happen.  

Third-party risk is business risk  

Third-party risk is business risk. As the MOVEit incident showed, a supplier’s weakness can quickly become the breach of a financial firm that uses one or many of its services. Treating vendor risk as a core pillar of cyber resilience means putting experienced leadership in place, standardising vendor due diligence and assuming a breach by hardening internal recovery capabilities. 

The critical step is a rigorous vDDQ process. By completing due diligence of suppliers and vendors across a number of areas such as incident response planning, security policies and procedures and key roles, financial firms can best protect themselves against the cyber threat. 

About the Author

Chris Gunner is a Virtual Chief Information Security Officer (vCISO) at Thrive. He has extensive experience in information security and risk management, particularly within the financial and legal sectors. He helps organisations strengthen their security posture through strategic guidance, risk management and governance. 



Source_link

Previous Post

Quordle hints and answers for Monday, November 24 (game #1400)

Next Post

Why People Don’t Demand Data Privacy, Even As Governments & Corporations Collect More Personal Info

Next Post
This Week In Techdirt History: August 3rd – 9th

Why People Don’t Demand Data Privacy, Even As Governments & Corporations Collect More Personal Info

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

iOS 27 will reportedly focus on performance improvements and AI upgrades

by Tech Wavo
November 23, 2025
0
iOS 27 will reportedly focus on performance improvements and AI upgrades
Computers

After years of introducing major changes with its annual iOS releases, Apple may be altering its approach next time around,...

Read more

AI is too risky to insure, say people whose job is insuring risk

by Tech Wavo
November 23, 2025
0
AI is too risky to insure, say people whose job is insuring risk
Computers

What happens when the software that everyone’s racing to adopt becomes too risky for anyone to insure? According to reporting...

Read more

5 essential Black Friday deals for fitness-conscious over 50s – from massage guns to fitness trackers

by Tech Wavo
November 23, 2025
0
5 essential Black Friday deals for fitness-conscious over 50s – from massage guns to fitness trackers
Computers

There are always good Black Friday deals on fitness equipment, from home gym kit like weights and treadmills to smartwatches...

Read more

Odyssey gaming monitors are up to $350 off

by Tech Wavo
November 23, 2025
0
Samsung Odyssey gaming monitors are up to $350 off for Black Friday
Computers

If you’ve been waiting to upgrade your gaming setup, now’s the time. Samsung’s Odyssey G8 monitor is on sale for...

Read more

Site links

  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of use
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of use

No Result
View All Result
  • Home
  • Technology
  • Computers
  • Gadgets
  • Mobile
  • Apps
  • News
  • Financial
  • Stock