May 30 Webinar | SOC Talk: Automating Threat Response
Reduce Alert Noise and False Positives
Boost your team's productivity by cutting down alert noise and false positives.
Automate Security Operations
Boost efficiency, reduce burnout, and better manage risk through automation.
Dark Web Monitoring
Online protection tuned to the need of your business.
Maximize Existing Security Investments
Improve efficiencies from existing investments in security tools.
Beyond MDR
Move your security operations beyond the limitations of MDR.
Secure with Microsoft 365 E5
Boost the power of Microsoft 365 E5 security.
Secure Multi-Cloud Environments
Improve cloud security and overcome complexity across multi-cloud environments.
Secure Mergers and Acquisitions
Control cyber risk for business acquisitions and dispersed business units.
Operational Technology
Solve security operations challenges affecting critical operational technology (OT) infrastructure.
Force-Multiply Your Security Operations
Whether you’re just starting your security journey, need to up your game, or you’re not happy with an existing service, we can help you to achieve your security goals.
Detection Investigation Response
Modernize Detection, Investigation, Response with a Security Operations Platform.
Threat Hunting
Locate and eliminate lurking threats with ReliaQuest GreyMatter
Threat Intelligence
Find cyber threats that have evaded your defenses.
Model Index
Security metrics to manage and improve security operations.
Breach and Attack Simulation
GreyMatter Verify is ReliaQuest’s automated breach and attack simulation capability.
Digital Risk Protection
Continuous monitoring of open, deep, and dark web sources to identify threats.
Phishing Analyzer
GreyMatter Phishing Analyzer removes the abuse mailbox management by automating the DIR process for you.
Integration Partners
The GreyMatter cloud-native Open XDR platform integrates with a fast-growing number of market-leading technologies.
Unify and Optimize Your Security Operations
ReliaQuest GreyMatter is a security operations platform built on an open XDR architecture and designed to help security teams increase visibility, reduce complexity, and manage risk across their security tools, including on-premises, clouds, networks, and endpoints.
Blog
Company Blog
Case Studies
Brands of the world trust ReliaQuest to achieve their security goals.
Data Sheets
Learn how to achieve your security outcomes faster with ReliaQuest GreyMatter.
eBooks
The latest security trends and perspectives to help inform your security operations.
Industry Guides and Reports
The latest security research and industry reports.
Podcasts
Catch up on the latest cybersecurity podcasts, and mindset moments from our very own mental performance coaches.
Solution Briefs
A deep dive on how ReliaQuest GreyMatter addresses security challenges.
White Papers
The latest white papers focused on security operations strategy, technology & insight.
Videos
Current and future SOC trends presented by our security experts.
Events & Webinars
Explore all upcoming company events, in-person and on-demand webinars
ReliaQuest ResourceCenter
From prevention techniques to emerging security trends, our comprehensive library can arm you with the tools you need to improve your security posture.
Threat Research
Get the latest threat analysis from the ReliaQuest Threat Research Team. ReliaQuest ShadowTalk Weekly podcast featuring discussions on the latest cybersecurity news and threat research.
Shadow Talk
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories.
May 01, 2024
About ReliaQuest
We bring our best attitude, energy and effort to everything we do, every day, to make security possible.
Leadership
Security is a team sport.
No Show Dogs Podcast
Mental Performance Coaches Derin McMains and Dr. Nicole Detling interview world-class performers across multiple industries.
Make It Possible
Make It Possible reflects our focus on bringing cybersecurity awareness to our communities and enabling the next generation of cybersecurity professionals.
Careers
Join our world-class team.
Press and Media Coverage
ReliaQuest newsroom covering the latest press release and media coverage.
Become a Channel Partner
When you partner with ReliaQuest, you help deliver world-class cybersecurity solutions.
Contact Us
How can we help you?
A Mindset Like No Other in the Industry
Many companies tout their cultures; at ReliaQuest, we share a mindset. We focus on four values every day to make security possible: being accountable, helpful, adaptable, and focused. These values drive development of our platform, relationships with our customers and partners, and further the ReliaQuest promise of security confidence across our customers and our own teams.
More results...
As social distancing becomes more prevalent during the COVID-19 (Coronavirus) pandemic, many organizations are moving to a virtual workplace. Organizations preparing for a predominantly virtual workplace may begin working with additional third-party vendors in order to maintain business continuity.
But while third-party vendors can help with maintaining the business, they also bring additional risk, which may be overlooked while day-to-day operations are changing rapidly.
In this blog, we will discuss the risks organizations face from relying on third parties during the COVID-19 outbreak.
Mere days after COVID-19 started to spread around the globe, threat actors began taking advantage of the opportunity to target organizations and individuals with COVID-19 themed attacks (see our blog How cybercriminals are taking advantage of COVID-19: Scams, fraud, and misinformation).
March 15 2020: The United States Department of Health & Human Services was targeted in a distributed denial of service (DDoS) attack, likely aimed at undermining the department’s response to the COVID-19 pandemic.
March 12 2020: Security researchers identified a fraudulent website, pretending to promote the system optimization software and utilities from WiseCleaner, distributing a new variant of ransomware called “CoronaVirus”.
January 29 2020: Security researchers reported that the Emotet trojan was being distributed via phishing emails containing fake COVID-19 public health warnings.
While organizations alternate operations to ensure employees’ safety, it is unfortunately an opportune time for threat actors to take advantage of the concern. We are likely to see threat actors targeting third-party vendors to gain access to organizations’ data during this pandemic.
Third-party data breaches are nothing new.
Headlines are filled with breaches caused by criminals accessing an organization’s data through a third-party vendor. Threat actors often look for the path of least resistance when attempting to infiltrate networks, and targeting third-party vendors allows cybercriminals to remain undetected and possibly target multiple organizations at once. In August 2019 for example, threat actors were able to use a third-party vendor to spread the Sodinokibi (REvil) ransomware to 22 Texas cities.
As organizations rush to prepare themselves for a new workplace standard and the lasting impact of COVID-19, they also need to consider the additional risks associated with their third-party vendors.
_
Moving to a virtual workplace increases the use of online channels including meetings, communications, and daily operations. Higher online dependency presents increasing cybersecurity risks as the attack surface expands beyond the organizations’ traditional network.
According to a 2018 study by the Ponemon Institute, nearly 60% of companies surveyed have suffered a data breach at the hands of a third-party vendor and only 34% have a comprehensive inventory of all third-party suppliers they work with.
Organizations that do not typically have remote workers may have to take on additional third-party vendors for services such as virtual private network (VPN) and e-meetings.
Third-party risks can include operational risk, transaction, risk, and compliance/regulatory risk. Let’s dive into each of these.
1. Operational risk
Operational risk is the prospect of loss resulting from inadequate or failed procedures, systems, or policies. These types of risks can include employee errors, system failures, fraud or other criminal activity, and any event that disrupts business processes.
It is imperative that third party vendors are scrutinized to ensure the needs of the organization can be met. This should include ensuring the third-party vendor has a business continuity and disaster recovery plan. Ensuring a third-party has a plan to get through the COVID-19 pandemic is vital since their own failure may result in a loss to your organization as well.
2. Transaction risk
Transaction risk is the risk of loss due to problems with the service or delivery. These types of risks include inadequate capacity, technological failure, and human error.
It is crucial during the COVID-19 pandemic that organizations are able to continue operating at a level as close to normal as possible. Third-party vendors that are unable to handle the capacity of an organization’s needs pose a risk by interfering with operations. Third-party vendor’s business continuity plans should also include plans to provide uninterrupted service to organizations during the pandemic.
3. Compliance risk
This type of risk could extend liability to the organization if the third-party experiences security breaches involving customer information in violation of the safeguarding of customer information standards.
While changes in workflow are changing rapidly, it is imperative that organizations ensure all third-party vendors are following applicable laws and regulations.
Although many organizations are working quickly to migrate their employees to remote working, it is more important than ever to ensure third-party risks are considered and evaluated. Here’s a few ways your organization can mitigate these third party risks.
We’ve also put together an extensive blog on how to manage your security ecosystem, Third Party Risk: 4 ways to manage your security ecosystem.
As social distancing becomes more ‘normal’ for more and more people globally, organizations should continue to evaluate third-party vendors to ensure risks are being properly managed.
Want to detect third-party data exposure to your organization instantly? Learn how our Search Light (now ReliaQuest GreyMatter Digital Risk Protection) service can help.