
Are You Managing Your Third Party Cyber Security Risks?
Third party compromises are becoming increasingly common vectors for cyber security breaches. CIOs need to have a program in place to manage these risks.

Third party compromises are becoming increasingly common vectors for cyber security breaches. CIOs need to have a program in place to manage these risks.

One of the immediate effects of the COVID-19 pandemic was the closure of offices and the move to remote working conditions. Some businesses were able to immediately execute this as part of their business continuity plan (BCP). Now that the crisis has become the business-as-usual state, challenges have also begun to appear and BCPs need revising to adapt to this new situation.