Category: Third Party Risk

a network of business communications represented by icons like an envelope, a box, pair of headphones, etc in blue connected with white lines to a red icon of a hacker in a fedora.
April 24, 2021

Lessons Learned from the Global Year in Breach: Supply Chain Cybersecurity Risk is Swamping Businesses

Clients love the ID Agent Digital Risk Protection Platform. But don’t take our word for it – hear from them directly in 2 new case studies!

Read More
March 11, 2021

Microsoft Hack Draws New Attention to Third-Party Risk

Microsoft hack starring Chinese nation-state hackers brings trouble that can damage busi9nesses for months. here are some quick, effective mitigations.

Read More
IoT cybersecurity risk
January 25, 2021

Is Biden’s Peloton Bike an IoT Cybersecurity Risk?

President Biden may be bringing an IoT cybersecurity risk to the White House: his Peloton bike. Here’s how to handle similar threats.

Read More
records on the dark web represented by hackers with big hats and laptops in a cartoon style
January 18, 2021

Hackers Leaked 22 Billion Records on the Dark Web in 2020

Hackers leaked over 22 million records on the Dark Web in 2020, putting your business in danger of cyberattacks. Here’s how to mitigate it.

Read More
supply chain risk represented by a handshake overlaid with an image of a chain in green on a black background.
December 17, 2020

Federal Hack Shows Supply Chain Risk Danger

Every organization is in danger of cybersecurity disaster from supply chain risk. Make these moves to mitigate it quickly & cost-effectively.

Read More
student data breach danger represented by a computer screen reading elearning
August 20, 2020

Student Data Breach Danger Also Impacts Businesses

Student data breach danger is growing. So how does a breach like that impact your business? Here are 3 major hazards, and 3 ways to eliminate them.

Read More
third party data breach represented by a burglar reaching through several computer screens to steal data.
July 17, 2020

How Dangerous is a Third Party Data Breach in 2020?

Companies can control their own cybersecurity, but not a business partner’s. How dangerous is a third party data breach?

Read More

Please fill in the form below to subscribe to our blog