Third Party Breaches - A Survey of Threats and Recommendations

Paul Wagner
DOI: https://doi.org/10.2139/ssrn.3782822
2021-01-01
SSRN Electronic Journal
Abstract:Trust is a very important character trait and takes on many forms. People trust one another to develop relationships, organizations trust their supply chains to provide and deliver necessities to stay in business, and data consumers trust cloud service providers to protect their data and provide services as agreed upon. Trust however inherently comes with a certain amount of risk; “It’s difficult to learn how to trust because we know all too well the risk that comes along with it.” (Abood, 2018). In the cybersecurity world, these risks manifest themselves through breaches. According to the Ponemon institute, sixty-one percent of U.S. respondents reported their organizations experienced a data breach caused by a third-party affiliate (Editorial, 2020). This is a 5% increase from 2017 and a 7% increase from the year prior (Ponemon, 2017). This paper will discuss three examples of third-party breaches from different verticals, specific threats associated with these breaches, and actions parties should take to mitigate these threats. Finally, the paper will discuss additional recommendations for improving security while interacting with third parties.
What problem does this paper attempt to address?