What if you learned that more than 40% of your security breaches had been caused by third party vendors? You’d be shocked, right?
This is one of the findings of the Ponemon Institute’s fourth annual Patient Privacy & Data Security Study. Interviews with 388 healthcare professionals revealed that more than a third of all security breaches were directly related to external vendor “snafus.”
Clearly, this is not something to be taken lightly and, fortunately, many leading analysts and consulting firms have been promoting the need for Vendor Risk Management (VRM) for some time now. However, data from the Ponemon Institute’s report and the recent revelations about the security breach at Target have put VRM in an entirely new spotlight. But what exactly is VRM and how can you implement it?
According to research analyst firm, Gartner, VRM is “the process of ensuring that the use of service providers and IT suppliers does not create an unacceptable potential for business disruption or a negative impact on business performance.”
As makers of the industry’s most secure remote access solution, we are well aware of the importance of being able to effectively manage vendors. In fact, every day our customers use Impero Connect to:
- Centrally govern remote vendor access.
- Define granular permission settings (for individual vendors).
- Grant access to specific devices.
- And record session activities for auditing purposes.
If you’re struggling to manage vendor access, are concerned about security or have experienced a breach as a result of a third party, Impero can help. Contact us today to learn how Impero Connect can aid your VRM initiatives.