• Products
  • Services
  • Compliance
  • Resources
  • Partners
  • Book a Return Call
  • English
    • العربية
    • Türkçe
    • Español
    • Português
  • All Products
    SearchInform DLP
    SearchInform Risk Monitor
    SearchInform ProfileCenter
    SearchInform FileAuditor
    SearchInform SIEM
    TimeInformer
    Cloud solutions
    Third-party integration
    All Services
    SearchInform MSS
    SearchInform for MSSP
    SearchInform solution in the cloud
    All Resources
    White Papers
    Research
    How to
    Practices and use cases
    Videos
    All Challenges
    Abnormal event detection
    Data loss prevention
    Employee with problems
    Data visibility
    Behavioral risk management
    Measuring employee morale
    Compliance
    Time tracking & employee monitoring software
    Corporate fraud
    Ransomware protection
    Data at rest discovery
    Real time monitoring
    Data encryption
    Investigation
    Employee Profiling
    Personal data protection
    All Roles
    C-level executive
    Compliance manager
    Risk manager
    Information security analyst
    Internal audit officer
    Chief Human Resources Officer
    All Industries
    Business Services
    Technology
    Education
    Healthcare
    Financial Services
    Retail
    Government
    Energy
    Insurance
    Hospitality
    Manufacturing
    Construction
    Compliance with SearchInform
    SAMA Cybersecurity Framework
    GDPR
    Personal Data Protection Bill
    Compliance with Data Cybersecurity Controls
    Compliance with Kingdom of Saudi Arabia Personal Data Protection Law
    SearchInform Partners
    Become a Partner
    Partner login
    Events
    News
    About our company
    Blog
    Contact Us
    Language:
    • English
    • العربية
    • Türkçe
    • Español
    • Português
    Follow us:
    Book a Return Call
Home — Blog — Multi-party breaches vs third-party related incidents
Back
BACK TO BLOG LIST
Multi-party breaches vs third-party related incidents
30.09.2021

A sophisticated network of digital interconnections causes the unavoidable growth of multi-party data breaches.

According to the research released by Cyentia Institute and RiskRecon and based on the analysis of 897 multi-party data breach incidents which have happened since 2008.

The most awful multi-party data breach brings 26 times bigger financial loss than the most terrible single-party one might cause.

Multi-party breaches are also known as ripple events — incidents which cover more and more organisations and keep affecting them one by one even after some time. It usually takes almost a year for a multi-party breach to harm 75% of businesses which were in any relation to the breach source.

The average number of companies involved in a ripple event is 4.

It’s like working with an unreliable contractor the systems of which have access to your data but the proper security policies aren’t introduced and there’s no data protection strategy implemented — in such case it doesn’t matter how good your own security rules are within your corporate perimeter and how sure you are about the level of compliance of your organisation, if the quality of risk management program of your contractor is much lower than your perfectly verified control tactics than your data simply can’t be safe.

That’s what happens with businesses impacted by a multi-party breach incident. Poor security measures taken by any party can affect companies which aren’t connected to this “weak spot operator” directly but are interrelated with it via some other service.

The widest damage is done when some service provider suffers a security issue, and the system, where the problem occurs, is focal to the provided services, i.e. centralised services. In this way the number of affected organisations can amount to hundreds.


Don't share your data with an organisation which doesn't take full responsibility for its protection and which doesn't comply with the recent information security requirements. Learn more why it is important to control third-party security policies.


BACK TO BLOG LIST
Letter Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyber incidents.
Email
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
FileAuditor
DLP
Risk Monitor
ProfileCenter
SIEM
MSS
MSSP
Cloud Deployment
Contact
About Our Company
Our Clients
Press About Us
Press Kit
White Papers
Third-party integration
Research
Practices and use cases
Videos
Company News
Product News
Events
Blog
Compliance
Data Loss Prevention
Investigation
Data at Rest Discovery
Data Encryption
Data Visibility
Data Classification and Protection
Time Tracking and Employee
Monitoring
Corporate Fraud Mitigation
C-level executive
Risk manager
Internal audit officer
Compliance manager
Information security analyst
Chief Human Resources Officer
Business Services
Education
Financial Services
Government
Insurance
Manufacturing
Healthcare
Retail
Energy
Hospitality
Construction
SearchInform partners
Become a partner
Partner login
SearchInform products are recognized by
Gartner The Radicati Group
Follow us:
© 2025 SearchInform LTD All rights reserved.
Terms of Use
Licence
Privacy&Cookies
Cookie settings
We use cookies to analyze our website usage, make our service more effective, and improve user experience. By continuing to use our website, you are agreeing to our policy.
Ok
Settings
Cookie Policy
✖

SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.

CATEGORY
DESCRIPTION
STATUS

Necessary Cookies

Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files record on the Internet Settings tab in your browser.

Functional Cookies

These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.

Performance Cookies

These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.

Third-party Cookies

These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.

Save Settings
✖

Please enable Functional Cookies

You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.

Cookie settings

Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time.
 

Subscribe to our newsletter and receive case studies in comics!

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time.