According to SecureLink third-party data breach report, 74% of organisations dealt with leakage consequences due to excessive availability of data to third parties.
In half of cases too much access as well as poor monitoring of privileged access led to misuse of confidential data.
The risks calculation was improperly tackled, thus affecting the quality of third-party access assessment.
51% neglected evaluation of privacy practices and security policies exercised by third-party organisations.
54% granted full responsibility to third-parties after entrusting them with corporate information.
63% of companies literally confided their data to third-parties as to ones with good reputation instead of checking their conformity to the security policies anyway.
54% blamed having insufficient access management strategy and therefore they were unable to conduct inventory of the organisations they agreed to work with.
65% were incapable of knowing for sure which exactly third parties could access their sensitive documents.
63% had still not enough knowledge about who among internal and external users could access their networks which proves a serious lack of visibility.
52% appeared to ignorant of regulatory compliance regarding data breach reporting and had trouble communicating an incident to the corresponding authority.
Learn more about compliance and what every company should be aware of protecting confidential data
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!