Vendor Risk Assessment: A Guide to Protecting Your Business

Reading time: 15 min

Introduction to Vendor Risk Assessment

Imagine you’re assembling a high-stakes puzzle — each vendor you work with is a crucial piece. One misfit, and the picture becomes unclear, or worse, unrecognizable. That’s where vendor risk assessment comes in: the strategic process that ensures every piece fits seamlessly, safeguarding your business from chaos.

Vendor risk assessment is the art and science of identifying, evaluating, and mitigating risks posed by the third-party vendors your business relies on. These risks can range from financial instability and operational hiccups to compliance violations and cybersecurity threats. With the global business ecosystem becoming increasingly interconnected, this practice has moved from being an optional safeguard to an indispensable strategy for maintaining business continuity. Frameworks like ISO 27001 and the NIST Cybersecurity Framework act as guiding lights, offering structured methodologies to secure vendor relationships and fortify operations.

But why stop at understanding its importance? Let’s dive deeper into how vendor risk assessment unfolds, ensuring your business stays resilient and ahead of potential challenges.

The Vendor Risk Assessment Process

Imagine your business as a complex machine, with each vendor functioning as a critical gear. When all gears work together seamlessly, the machine operates at peak efficiency. But what happens if one gear breaks or doesn’t align properly? The machine falters, sometimes catastrophically. Vendor risk assessment is the maintenance plan that ensures every gear is reliable, aligned, and well-oiled to keep your business running smoothly.

Vendor risk assessment is not a one-size-fits-all process; it’s a customized, dynamic approach that evolves as your business and vendor landscape change. Let’s dive deeper into the steps, tools, and strategies that make up an effective vendor risk assessment.

Steps in Conducting a Vendor Risk Assessment

  1. Identifying Vendor Dependencies
    Start by understanding the role each vendor plays in your business operations. Consider:
    • Critical Vendors: Those essential for business continuity, such as IT service providers, cloud platforms, or logistics companies.
    • Non-Critical Vendors: Providers of auxiliary services, such as office supply vendors or event caterers.

Identifying dependencies ensures your assessment prioritizes vendors whose failure would have the most significant impact.

  1. Risk Categorization: High, Medium, Low
    Not all vendors pose the same level of risk. Categorize them into tiers:
    • High Risk: Vendors handling sensitive data or integral to key operations.
    • Medium Risk: Vendors supporting important but non-critical functions.
    • Low Risk: Vendors with minimal access or influence over operations.

This tiered approach allows you to allocate resources efficiently, focusing your efforts where the stakes are highest.

DLP
Protect data from leaks on endpoints, in LANs, in the cloud, and in virtual environments.
Monitor even highly secure channels for leaks (Telegram, WhatsApp, Viber, etc.
Detailed archiving of incidents.
Safeguard remote workers using Zoom, RDP, TeamViewer, and other services for remote work or access.
  1. Due Diligence in Vendor Selection
    Think of onboarding a vendor as adding a new member to your team. You wouldn’t hire someone without checking their resume and references, and the same applies to vendors. Conduct due diligence by:
    • Reviewing their financial stability and creditworthiness.
    • Assessing their compliance with relevant laws and standards.
    • Investigating their cybersecurity policies and previous incident history.

This proactive vetting process reduces the likelihood of onboarding vendors who may later pose problems.

  1. Defining Risk Appetite and Tolerance
    Every business has a unique risk appetite. Determine:
    • What levels of risk your organization can tolerate without significant disruption.
    • Which risks are unacceptable, such as non-compliance with industry regulations or exposure to unencrypted data.

These boundaries serve as guiding principles for decision-making.

  1. Ongoing Monitoring and Reviews
    Risks aren’t static. A vendor that was low risk last year might be high risk today due to changes in their operations, market conditions, or regulations. Implement a system for:
    • Regular risk reviews and audits.
    • Continuous monitoring of vendor performance.
    • Tracking compliance with service level agreements (SLAs) and regulatory requirements.

Automation tools can simplify this process, providing real-time alerts for potential issues.

  1. Incident Response and Contingency Planning
    Even with the best risk assessment processes, incidents can occur. Be prepared by:
    • Developing a comprehensive incident response plan that outlines steps to mitigate damage.
    • Establishing clear communication protocols to inform stakeholders quickly.
    • Identifying backup vendors or alternative solutions to ensure business continuity.

Tools and Techniques for Effective Vendor Risk Assessment

Conducting vendor risk assessment manually can be overwhelming, especially for organizations with large vendor ecosystems. Fortunately, technology can simplify and enhance the process:

  1. Third-Party Risk Management Platforms
    These tools centralize vendor data, automate risk scoring, and track compliance metrics, providing a clear overview of your vendor landscape.
  2. Risk Assessment Questionnaires
    Tailored questionnaires help identify vendor-specific vulnerabilities. For instance:
    • A tech vendor may be asked about encryption standards and cybersecurity protocols.
    • A healthcare vendor may need to provide details on HIPAA compliance.
  3. Predictive Analytics and AI Tools
    Predictive analytics can spot patterns and forecast potential risks. For example:
    • Declining vendor performance metrics might signal a future failure.
    • Market trends can indicate whether a vendor’s financial stability is at risk.
  4. Real-Time Monitoring Solutions
    Continuous monitoring tools track vendor behavior and provide alerts for anomalies. This helps businesses respond proactively rather than reactively.
  5. Regulatory Compliance Checkers
    Tools that automate compliance checks ensure vendors adhere to evolving laws and industry standards, reducing the burden on internal teams.

Integrating Risk Assessments into Business Operations

For vendor risk assessment to be effective, it needs to be a seamless part of your business strategy. Here’s how to achieve that integration:

  • Make Risk Assessment a Procurement Requirement
    Include vendor risk assessments in your procurement process. No vendor should be onboarded without a thorough evaluation.
  • Align Risk Assessments with Compliance Goals
    Ensure assessments help you meet regulatory requirements, such as GDPR for data protection or SOX for financial reporting.
  • Use Risk Scores for Operational Decisions
    Risk scores allow you to prioritize oversight and decision-making. Vendors with higher risk scores might require closer monitoring, while those with low scores may need less frequent reviews.
  • Tie Risk Assessment to Performance Metrics
    Link vendor performance to your internal metrics, ensuring they consistently meet expectations and contractual obligations.

Vendor risk assessment is like fine-tuning a complex machine: it requires precision, adaptability, and ongoing maintenance. But understanding the risks vendors can bring is just as crucial as the process of assessing them. Let’s take a closer look at the specific types of risks vendors can introduce and how businesses can mitigate them effectively.

Types of Vendor Risks

Working with vendors is like inviting players to join your team. Each brings value and skill, but if one drops the ball, it could jeopardize the entire game. Vendor risk assessment identifies and mitigates the risks vendors may bring, helping ensure your business stays on a winning streak.

Vendors contribute to your operations, but they can also introduce vulnerabilities. By understanding the different types of risks they pose, you can implement strategies to protect your business. Let’s break it down:

Financial Risks

Imagine relying on a supplier, only to find out they’re teetering on the edge of bankruptcy. Their financial instability could disrupt your supply chain, delay projects, or even halt critical services. Vendor risk assessment can uncover:

  • Weak financial performance.
  • Cash flow issues.
  • Over-reliance on a single source of revenue.

By reviewing financial statements, credit ratings, and market stability, businesses can avoid partnerships that may falter under pressure.

Operational Risks

When a vendor fails to deliver, your operations can grind to a halt. Consider:

  • Missed deadlines due to inadequate staffing or resources.
  • System outages caused by poorly maintained technology.
  • Quality issues that affect your product or service delivery.

Operational risks can tarnish your reputation and frustrate customers. Regular performance reviews and monitoring help ensure vendors meet their obligations.

Compliance and Regulatory Risks

Non-compliance by vendors isn’t just their problem — it becomes yours. Imagine a healthcare vendor mishandling patient data or failing to meet HIPAA requirements. This could result in:

  • Legal action against your business.
  • Fines and penalties.
  • Damage to your brand reputation.

Vendor risk assessment includes verifying adherence to regulations like GDPR, PCI DSS, or industry-specific standards. Compliance monitoring tools can streamline this process, ensuring ongoing vigilance.

Strategic Risks

Your vendors’ actions can directly impact your business goals and public image. Strategic risks arise from:

  • Misaligned objectives: A vendor might prioritize profit over quality, affecting your product or service.
  • Reputational damage: A vendor embroiled in a public scandal could tarnish your company by association.

Careful vetting and continuous alignment of goals can mitigate these risks, keeping your strategy on track.

Cybersecurity Risks

Cybersecurity is one of the most critical aspects of vendor risk assessment. Vendors with access to your systems or data can inadvertently (or maliciously) open doors to cyber threats. Risks include:

  • Data breaches exposing sensitive customer or business information.
  • Weak password protocols leading to unauthorized access.
  • Vendors falling victim to ransomware attacks that cascade into your operations.

To combat this, ensure vendors follow robust cybersecurity practices, such as encryption, multi-factor authentication, and regular security audits.

Emerging Risks: ESG and Geopolitical Factors

Today’s landscape brings additional risks that businesses must consider:

  • Environmental, Social, and Governance (ESG) Risks: Vendors failing to meet sustainability goals or ethical labor practices could tarnish your reputation and alienate stakeholders.
  • Geopolitical Risks: Vendors in unstable regions may face disruptions from political unrest, trade sanctions, or natural disasters.

Incorporating these factors into your vendor risk assessment ensures a holistic approach, accounting for evolving challenges.

From Risks to Real-World Applications

Understanding the different types of risks vendors can introduce is critical, but how these risks manifest can vary widely across industries. Each sector faces unique challenges, from safeguarding sensitive financial data to securing supply chains and critical infrastructure. Vendor risk assessment plays a vital role in addressing these industry-specific concerns. Let’s dive into how this process is applied in key industries to mitigate risks and enhance operational resilience.

Vendor Risk Assessment in Key Industries

Think of industries as unique ecosystems, each with its own challenges and opportunities. Vendors are like the lifelines that support these ecosystems, and vendor risk assessment acts as the safety net, ensuring businesses thrive while mitigating risks. Let’s explore how vendor risk assessment is applied across key industries to address their distinct vulnerabilities.

Finance: Ensuring Data Protection in Vendor Relations

In the finance industry, data is the lifeblood of operations. From banks to investment firms, institutions depend on vendors to manage everything from transaction processing to customer relationship management. However, this reliance introduces critical risks:

How to protect personal data and comply with regulations
How to ensure protection of personal data
How SearchInform helps organizations to comply with basic regulations’ requirements: PDPL, GDPR, KVKK etc
  • Data Breaches: Vendors with weak cybersecurity protocols can expose sensitive financial information.
  • Regulatory Non-Compliance: Third-party vendors must adhere to regulations like GDPR, PCI DSS, or SOX. A vendor’s failure to comply could lead to penalties and reputational damage for your business.

How Vendor Risk Assessment Helps:

  • Conducting due diligence to evaluate vendors’ cybersecurity and compliance measures.
  • Continuously monitoring vendor activities to ensure adherence to financial regulations.
  • Implementing strict access controls to protect sensitive customer data.

Healthcare: Securing Patient Data and Vendor Compliance

The healthcare sector is a labyrinth of data management, from electronic health records (EHR) to medical billing systems. Vendors often have access to sensitive patient information, making robust vendor risk assessment a necessity:

  • HIPAA Compliance Risks: Vendors handling patient data must comply with stringent regulations.
  • Operational Risks: Disruptions in vendor services, such as medical software outages, can delay patient care.

How Vendor Risk Assessment Helps:

  • Evaluating vendors for compliance with HIPAA, GDPR, and other healthcare-specific regulations.
  • Monitoring vendors’ performance to prevent operational hiccups in critical medical processes.
  • Verifying the use of secure systems and protocols to safeguard patient data.

Retail: Managing Supply Chain Vulnerabilities

The retail sector relies heavily on a complex web of vendors, from manufacturers to payment processors. This ecosystem makes vendor risk assessment essential for:

  • Supply Chain Disruptions: Delays or failures by vendors can lead to stock shortages and customer dissatisfaction.
  • Cybersecurity Risks: Vendors managing payment systems or customer data can become targets for cyberattacks.

How Vendor Risk Assessment Helps:

  • Identifying high-risk vendors within the supply chain and implementing contingency plans.
  • Ensuring vendors comply with payment security standards like PCI DSS.
  • Conducting regular audits to verify the integrity of vendors’ systems and practices.

Energy: Vendor Risks in Critical Infrastructure

The energy sector is the backbone of economies, and its reliance on vendors for infrastructure, maintenance, and technology makes it highly vulnerable:

  • Operational Risks: Failures in vendor-provided systems could disrupt power grids or energy supplies.
  • Cybersecurity Threats: Vendors with access to control systems or sensitive data can become targets for nation-state actors or cybercriminals.

How Vendor Risk Assessment Helps:

  • Evaluating vendors’ cybersecurity measures to protect against critical infrastructure attacks.
  • Monitoring vendor performance to ensure uninterrupted energy supply.
  • Implementing redundancy measures to mitigate the impact of vendor failures.

Technology: Mitigating Risks in Innovation-Driven Partnerships

In the tech industry, where innovation drives success, vendors play a pivotal role in software development, cloud services, and hardware supply. However, risks include:

  • Intellectual Property (IP) Theft: Vendors with access to proprietary technologies or ideas may misuse them.
  • Service Downtime: Cloud or IT service vendors experiencing outages can cause widespread disruption.

How Vendor Risk Assessment Helps:

  • Evaluating vendors’ IP protection policies and legal agreements.
  • Ensuring service level agreements (SLAs) include robust uptime guarantees.
  • Monitoring vendors’ infrastructure for vulnerabilities.

Government: Ensuring Vendor Accountability and Compliance

Public sector organizations rely on vendors for everything from infrastructure projects to IT services. Risks include:

  • Non-Compliance with Regulations: Government contracts are subject to stringent requirements.
  • Corruption and Fraud Risks: Vendor misconduct can lead to financial losses and public distrust.

How Vendor Risk Assessment Helps:

  • Implementing rigorous vetting processes to ensure vendor compliance with legal standards.
  • Monitoring contracts to prevent overbilling or fraudulent activities.
  • Ensuring transparency and accountability through regular audits.

From Industry Challenges to Best Practices

While each industry faces unique risks, the underlying principles of vendor risk assessment remain universal: identify vulnerabilities, implement safeguards, and ensure accountability. But how can businesses take these insights and translate them into actionable strategies? The next section explores best practices for building a robust vendor risk management framework that works across industries.

Best Practices for Vendor Risk Management

Managing vendor risks is much like running a high-stakes relay race: every participant (vendor) needs to perform seamlessly, passing the baton without faltering. A single misstep can disrupt the entire flow, costing your business time, money, and reputation. Vendor risk assessment acts as your coach, ensuring every player knows their role, while best practices provide the game plan to execute flawlessly. Let’s delve into actionable strategies to build a resilient vendor risk management framework.

Implementing a Risk-Based Vendor Assessment Approach

Why spread resources evenly when not all vendors carry the same weight? A risk-based approach allows you to focus your attention where it’s needed most.

  • Prioritize High-Risk Vendors: These include vendors with access to sensitive data, critical systems, or those essential to business continuity. High-risk vendors should undergo:
    • Frequent audits.
    • Detailed compliance checks.
    • Enhanced monitoring for performance and security.
  • Proportional Oversight for Lower-Risk Vendors: Vendors with minimal access or impact can be monitored less rigorously but still require periodic reviews to ensure no overlooked risks emerge.

Example: An e-commerce platform might assign top priority to its payment gateway provider, while keeping moderate oversight on its packaging supplier.

Building a Comprehensive Vendor Risk Management Policy

Your policy is the compass guiding every decision in vendor risk management. It sets expectations, outlines risk thresholds, and defines accountability for all parties.

  • Establish Clear Guidelines: Include criteria for vendor selection, performance metrics, and security standards.
  • Define Risk Tolerance: Specify what risks are acceptable and establish escalation protocols for breaches.
  • Embed Flexibility: Ensure the policy can adapt to new risks or industry changes without requiring a complete overhaul.

Example: A financial services company might mandate all vendors to use multi-factor authentication and encryption for accessing shared systems.

Leveraging Technology for Continuous Monitoring

In today’s fast-paced business environment, manual vendor oversight is a thing of the past. Technology offers powerful tools to streamline vendor risk assessment and provide real-time insights.

  • Third-Party Risk Management Platforms: Centralized systems that automate risk scoring, compliance tracking, and performance monitoring.
  • Predictive Analytics and AI Tools: These tools analyze patterns in vendor behavior, flagging early warning signs such as financial instability or cybersecurity vulnerabilities.
  • Real-Time Alerts: Automated notifications for compliance breaches, performance drops, or emerging risks ensure timely responses.

Example: A healthcare organization might use a third-party risk management platform to monitor its cloud vendors’ adherence to HIPAA regulations.

Training Teams on Vendor Risk Awareness

Your employees are the unsung heroes of vendor risk management. Proper training equips them to spot potential red flags and act swiftly.

  • Red Flag Detection: Teach teams to recognize early warning signs like inconsistent communication or unexplained delays.
  • Crisis Response Training: Ensure employees understand escalation protocols and their roles in incident resolution.
  • Periodic Workshops: Regularly update teams on emerging risks and evolving best practices.

Example: A logistics company might train its procurement team to identify unusually low bids, which could indicate financial instability or subpar quality.

Why to choose MSS by SearchInform
Access to cutting-edge solutions with minimum financial costs
No need to find and pay for specialists with rare competencies
A protection that can be arranged ASAP
Ability to increase security even without an expertise in house
The ability to obtain an audit or a day-by-day support

Establishing Strong Vendor Relationships

Vendor risk management isn’t just about oversight; it’s about partnership. A collaborative relationship can reduce risks and foster mutual growth.

  • Regular Communication: Schedule check-ins to discuss performance, address concerns, and explore opportunities for improvement.
  • Joint Risk Mitigation Plans: Work with vendors to identify vulnerabilities and co-develop strategies to address them.
  • Recognition and Incentives: Acknowledge high-performing vendors with awards or extended contracts to encourage continued excellence.

Example: An energy company might collaborate with its IT vendors to implement cutting-edge cybersecurity measures, ensuring system integrity.

Incorporating ESG Considerations into Vendor Risk Management

Incorporating environmental, social, and governance (ESG) factors into vendor risk assessment is no longer optional — it’s a competitive advantage.

  • Environmental Impact: Evaluate vendors’ carbon footprints and sustainability initiatives.
  • Ethical Labor Practices: Ensure vendors comply with ethical labor standards, avoiding exploitative practices.
  • Transparent Governance: Assess vendors’ leadership, business ethics, and transparency in decision-making.

Example: A manufacturing company might prioritize partnerships with vendors that demonstrate strong commitments to renewable energy and ethical sourcing.

Conducting Periodic and Dynamic Risk Assessments

A one-and-done approach doesn’t work for vendor risk assessment. Risks evolve, and so should your strategy.

  • Periodic Reassessments: Conduct regular evaluations to account for changes in vendor operations, market conditions, or regulations.
  • Dynamic Updates: Continuously refine your risk management framework based on new insights, incidents, or best practices.
  • Benchmarking: Compare your practices against industry leaders to stay competitive and compliant.

Example: A pharmaceutical company might reassess vendor risks annually to accommodate new FDA guidelines or shifts in vendor performance.

Enhancing Risk Management with Automation

Automation is revolutionizing vendor risk assessment by reducing manual workloads and increasing precision.

  • Automated Risk Scoring: Use AI to evaluate vendors based on predefined risk factors, providing instant insights.
  • Compliance Automation: Automatically track vendors’ adherence to regulations and flag deviations.
  • Incident Management Systems: Automate responses to incidents, from initial detection to resolution.

Example: A retail company might use automation tools to monitor its global supply chain vendors for geopolitical risks in real time.

From Best Practices to Tangible Solutions

Adopting these best practices lays a strong foundation for effective vendor risk management, but the journey doesn’t stop here. The right tools and expertise can amplify your efforts, turning strategies into actionable outcomes. Up next, we’ll explore how SearchInform’s innovative solutions can simplify vendor risk assessment, helping your business navigate challenges and seize opportunities with confidence.

How SearchInform Solutions Assist in Vendor Risk Management

Vendor risk management can feel like solving an intricate puzzle, with pieces constantly shifting due to evolving threats, regulatory changes, and operational complexities. Yet, the stakes couldn’t be higher. One weak vendor link can lead to data breaches, financial losses, compliance violations, or reputational damage. This is where SearchInform steps in — offering powerful, tailored solutions that transform vendor risk assessment from a daunting challenge into a streamlined, strategic advantage.

Here’s how SearchInform’s innovative tools and services empower businesses to stay ahead of vendor risks and build resilient partnerships.

Data Loss Prevention (DLP): Securing Your Sensitive Information

In today’s interconnected world, vendors often have access to critical business data, from intellectual property to customer records. SearchInform’s Data Loss Prevention (DLP) solution acts as a digital fortress, safeguarding your sensitive information while ensuring vendors maintain the same high security standards as your business.

  • Real-Time Data Monitoring: Tracks data flow between your business and vendors, detecting and preventing unauthorized transfers.
  • Customizable Access Controls: Ensures that vendors only have access to the data necessary for their role, reducing exposure to unnecessary risks.
  • Incident Alerts: Provides immediate notifications if suspicious activity is detected, allowing for rapid response and containment.

Risk Monitoring Tools: Staying Ahead of Vendor Vulnerabilities

Risks don’t stand still, and neither should your oversight. SearchInform’s risk monitoring tools provide continuous, real-time insights into vendor performance, enabling businesses to address vulnerabilities before they escalate.

  • Performance Dashboards: Offers a clear, visual representation of vendor activities, compliance status, and potential risks.
  • Automated Risk Scoring: Evaluates vendors based on predefined criteria, providing instant clarity on which partnerships require closer scrutiny.
  • Proactive Alerts: Sends real-time notifications about deviations from service level agreements (SLAs), compliance lapses, or emerging market risks.

Customizable Assessment Frameworks: Tailored to Your Industry’s Needs

Every industry has unique challenges, and a one-size-fits-all approach to vendor risk assessment doesn’t cut it. SearchInform offers customizable frameworks that align with your specific regulatory, operational, and strategic requirements.

  • Industry-Specific Templates: Provides pre-built assessment models for sectors such as finance, healthcare, retail, and energy.
  • Regulatory Compliance Integration: Ensures vendor evaluations are aligned with laws like GDPR, PCI DSS, or ISO 27001.
  • Scalable Solutions: Adapts to businesses of all sizes, from startups to multinational corporations, without losing precision or depth.

Continuous Improvement: Beyond Assessment to Optimization

SearchInform doesn’t just help businesses identify vendor risks; it empowers them to improve vendor relationships and optimize risk management strategies over time.

  • Collaborative Risk Mitigation: Facilitates joint efforts with vendors to address identified vulnerabilities, fostering stronger partnerships.
  • Periodic Review Tools: Streamlines regular reassessments, ensuring your vendor risk management framework evolves alongside market conditions.
  • Predictive Analytics: Uses machine learning to forecast potential risks, enabling proactive decision-making rather than reactive responses.

Comprehensive Reporting: Enhancing Transparency and Accountability

Transparent communication is critical in vendor risk management, both internally and with stakeholders. SearchInform’s reporting tools provide detailed, actionable insights into vendor performance and risk levels.

  • Custom Reports: Generates tailored reports for stakeholders, highlighting key findings and recommended actions.
  • Compliance Documentation: Helps businesses meet audit requirements by maintaining a clear record of vendor assessments and monitoring activities.
  • Visualization Tools: Uses graphs, charts, and dashboards to present complex data in an easily understandable format.

Why SearchInform is the Perfect Partner for Vendor Risk Management

SearchInform’s comprehensive suite of tools doesn’t just address vendor risks — it transforms them into opportunities for improvement and growth. By integrating advanced technology with deep industry expertise, SearchInform provides businesses with the confidence to navigate an increasingly complex vendor landscape.

  • Seamless Integration: SearchInform’s solutions are designed to integrate with existing workflows and systems, minimizing disruption while maximizing efficiency.
  • Scalable for Growth: Whether you’re a small business or a global enterprise, SearchInform’s solutions grow with you, adapting to new challenges and opportunities.
  • Proven Expertise: Trusted by businesses worldwide, SearchInform brings years of experience and a track record of success in vendor risk management.

Secure Your Business with SearchInform

Managing vendor risks is no longer optional — it’s a strategic imperative. With SearchInform, you gain more than just tools; you gain a partner dedicated to your success. Ready to transform your vendor risk assessment process into a competitive advantage? Explore SearchInform’s solutions today and take the first step toward stronger, smarter, and safer vendor relationships. Your business deserves nothing less.

Order your free 30-day trial
Full-featured software with no restrictions
on users or functionality

Company news

All news
Letter Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyber incidents.