The trouble with contractors: how granting full system access is a security weakness

The trouble with contractors: how granting full system access is a security weakness

AXELOS' "Cyber Stories from the Frontline" brings to life the reality of cybercrime for organizations today and from the perspective of those who have first-hand experience

How often do we hear stories of how multi-national corporations have been hacked via third-party software that runs their air conditioning or a contractor that supplies their catering?

This is exactly what happened to one CSO in our real-life 'Cyber Stories from the Frontline' series of cyber security stories.

How can the account act as both a warning and a guide for other organizations as they look to keep control of cyber security while using third-party contractors?

In the third of our series, The Trouble with Contractors, we explore:

  • How to handle a problematic part of your business: your contractors and their security practices.
  • How a contractor has easier access to your systems than a “hacker” – you’ve given them full access already!
  • What to do when a third-party supplier ‘goes rogue’ and warning signs are missed.
  • The importance of looking beyond how you think a contract with a supplier will protect you.
  • Why is crucial to know every contractor you’re working with, and especially those on the frontline.
  • The systems and processes to put in place to ensure greater control of contractor privileges.

To find out what you can learn from this Cyber Story from the Frontline, download the full story, The trouble with contractors.

Read more Cyber Stories from the Frontline

A Cuckoo in the Nest? When speed and innovation compromise security

What happens when your cyber-attack hits the headlines?

Hacked into a parallel universe

Current rating: 0 (0 ratings)

Comments

There are no comments posted.
You must log in to post a comment. Log in

Want to read more?

Read Whaling for Beginners, our cyber novella telling the story of a business hit by a cyber-attack and how they recovered.

You can also sign up for a free 14-day trial of RESILIA™ Frontline, our cyber security awareness training for all your people.