Accellion: Conquering cyber risk in 3rd party communications

The 3rd party communication dilemma

Trusting Untrustworthy, Yet Essential, Business Processes 

CISOs face a difficult trust dilemma when securing essential 3rd party business processes involving customers, suppliers, investors, and other supply chain partners. Every day, employees must share IP, PII, PHI, and other sensitive content with these trusted 3rd parties across untrusted networks, devices, applications, and identities. For example, a doctor referring a patient must send her PHI-laden electronic health records to a 3rd party clinic over the open internet. An insurer outsourcing a promotion must deliver a million customer and prospect contact records, full of PII, to a marketing vendor. The scenarios, and risks, abound.

For decades, organizations have protected core internal systems, such as SAP, SharePoint, Epic, and so forth, behind traditional security layers such as identity management and network firewalls. SaaS vendors like Salesforce do this on our behalf. This keeps outsiders out of internal content stores, however, 3rd party business processes necessarily circumvent these barriers via email, file sharing, SFTP, MFT, mobile, and other insecure communication channels. Every day, we are forced to transmit our most valuable information over the riskiest systems, including customer data, product designs, accounting details, and legal briefs. 

To read the full resource click here.