Understanding Threats and Vulnerabilities in Government Cybersecurity
In cybersecurity, especially in the public sector, clarity matters. Terms like “threat” and “vulnerability” are often used interchangeably, but they...
4 min read
Taylor Webster : Apr 1, 2024 9:42:27 AM
Running a non-profit takes a certain amount of grit and gumption. Often organizations with a small staff and tight budget outsource functions like web hosting and IT equipment maintenance to third-party service providers to save on time and labor. These vendors provide the crucial services you need, but understanding how to vet and select them in the first place can be daunting. Sometimes, it is easier to just sign up for one that looks moderately reputable so that you can get back to the core work of your organization.
Trusting a third-party service provider without verifying their security standards is a lot like sending your child to a daycare you have not ever visited. We wouldn't take that risk with our loved ones, so why do it with our data? Unfortunately, even the cybersecurity vendor you use can introduce inadvertent cyber risk to your organization if you don’t properly vet their data protection and cybersecurity standards before handing them access to your confidential information.
Although this security gap for third-party software in use at nonprofits has been an issue for a long time, it is a bigger problem now than it ever has been before. Through participation in the Joint Cyber Defense Collaborative’s High-Risk Communities planning effort, GovRAMP, CISA, and a host of industry and civil society partners are taking steps to address the rise in targeted cyber threats against civil society organizations for their work to advance humanitarian and democratic causes.
Whether you represent a think-tank, NGO, or grassroots volunteer organization, your data and ability to effectively accomplish your mission remains at risk. And as a non-profit, your organization likely does not have sufficient resources to manage every third-party vendor and software product you use.
While the onus should be on vendors to build privacy and security into the design and manufacture of their products, the current reality is that you need to vet third-party service providers and products to avoid introducing unnecessary risk into your digital ecosystem. Below, we have boiled down a few easy, practical steps you can take to help your organization mitigate third-party risk. You’ll get back to your organization’s core work in no time.
At the very foundation of managing third party supplies is knowing who has access to your systems and data and what they do for your organization. While it sounds elementary, it is the most critical step you can take. Simply creating an inventory in a basic Excel spreadsheet can enhance your organization’s visibility and control over system and data access by providing answers to the following questions:
Next, you should assess the risks associated with the data that your third-party vendors can transmit or store. Consider the following breakdown in criticality:
For third-party vendors that handle moderate and high-impact data for your organization, it’s crucial that you request information on their security practices.
The saying, “A chain is only as strong as its weakest link,” aptly illustrates the risk of third-party cybersecurity. Despite having a strong cybersecurity program, your organization’s data could be compromised in a third-party vendor data breach. To mitigate this risk, here are some key questions you should ask your third-party vendors about their security practices and policies:
While not comprehensive, these initial questions will give you a sense of whether your third-party vendors are serious about security – theirs and yours.
The challenge with evaluating current and prospective vendors using the question set above is that they may not answer truthfully, and verifying their claims can be difficult. This brings us to the next step: using the resources around you to help.
There are a few key things you can look for that will help you in validating the trustworthiness of third parties:
Learning about and understanding the security posture of the third-party providers handling your data is crucial. By identifying who has access to your data and systems, and gaining insight into their security approach, you are significantly enhancing your organization’s defense against threat actors' intent on disrupting your mission fulfilment.
Print out this simple checklist to begin your third-party risk management journey today!
In cybersecurity, especially in the public sector, clarity matters. Terms like “threat” and “vulnerability” are often used interchangeably, but they...
Risk isn’t just a technical concern. For both public and private sector organizations, it's a strategic consideration tied directly to trust,...
HRTec has long supported public sector organizations through its secure, scalable FedHIVE platform and Compliance as a Service model. As a GovRAMP...
On November 14, Leah McGrath, Executive Director of GovRAMP, presented the 2023 Staff Report to the Steering Committee. As we wrap up 2023, these Top...
Why did your organization become a GovRAMP member? As an organization working closely with state government clients, especially film commissions, ...
Securing cloud services and protecting consumer data is extremely important in today’s technology landscape. As more businesses rely on cloud...