Softtek Softtek
  • Our experience
  • Overview
  • Insights
  • Blog
  • Newsroom
  • Careers
  • Contact us
softtek Language Selector
ENGLISH
EUROPE / EN
ESPAÑOL
EUROPA / ES
PORTUGUÊS
中文(简体)
Search button
AI
APPROACH
INDUSTRIES
SERVICES & SOLUTIONS
TRANSCEND
Softtek GenAI
FRIDA AI for Software Engineering
Service Transformation
Portfolio Transformation
Digital Acceleration
Our Work
Agribusiness
Airlines
Automotive
Banking & Financial Services
Consumer Packaged Goods
Energy & Utilities
Fitness & Wellness
Gaming
Government & Public Sector
Higher Education
Healthcare
Industrial
Insurance
Media & Entertainment
Oil & Gas
Pharma & Beauty
Professional Sports
Restaurant & Hospitality
Retail
Technology
Telecommunications
Transportation & Logistics
Digital Solutions
Digital Optimization
Digital Sales
Data Masking Solution
IT Cost Optimization
Fan Engagement Ecosystem
Softtek Digital Enablers
DIEGO
blauLabs
Business OnDemand
Click2Sync Omnichannel
Automotive Digital Assistant
Guest Engagement
Socializer
Collaborative Commuting
Workplace Management
Application Services
Software Development
Quality Engineering
Application Management
Application Services
Cloud & DevOps
Cloud Services
IT Infrastructure
Digital Security
DevOps
Data & Automation
Data and AI
Intelligent Automation
Services Transformation
Core Modernization
Next-Gen IT Operations
Platform Services
AWS
SAP
Microsoft
Salesforce
ServiceNow
Atlassian
BlueYonder
Sustainability by Softtek
Softtek
Language selector
search button
AI
Softtek GenAI
FRIDA AI for Software Engineering
APPROACH
Service Transformation
Portfolio Transformation
Digital Acceleration
Our Work
INDUSTRIES
Agribusiness
Airlines
Automotive
Banking & Financial Services
Consumer Packaged Goods
Energy & Utilities
Fitness & Wellness
Gaming
Government & Public Sector
Higher Education
Healthcare
Industrial
Insurance
Media & Entertainment
Oil & Gas
Pharma & Beauty
Professional Sports
Restaurant & Hospitality
Retail
Technology
Telecommunications
Transportation & Logistics
SERVICES & SOLUTIONS
Digital Solutions
Digital Optimization
Digital Sales
Data Masking Solution
IT Cost Optimization
Fan Engagement Ecosystem
Softtek Digital Enablers
DIEGO
blauLabs
Business OnDemand
Click2Sync Omnichannel
Automotive Digital Assistant
Guest Engagement
Socializer
Collaborative Commuting
Workplace Management
Application Services
Software Development
Quality Engineering
Application Management
Application Services
Cloud & DevOps
Cloud Services
IT Infrastructure
Digital Security
DevOps
Data & Automation
Data and AI
Intelligent Automation
Services Transformation
Core Modernization
Next-Gen IT Operations
Platform Services
AWS
SAP
Microsoft
Salesforce
ServiceNow
Atlassian
BlueYonder
TRANSCEND
Sustainability by Softtek
Our experience
Overview
Insights
Blog
Newsroom
Careers
Contact us
ENGLISH
EUROPE / EN
ESPAÑOL
EUROPA / ES
PORTUGUÊS
中文(简体)
Softtek Blog

How Risky Are Your Suppliers? A Look at Digital 3rd-Party Risk in 2016

Author:
Author Federico Ferreres
Published on:
Sep 16, 2016
Reading time:
Sep 2016
|
SHARE
Share on LinkedIn
Share on X
Share on Facebook
SHARE
Share on LinkedIn
Share on X
Share on Facebook


Securing_Supplier_Risk_Management.jpgIncreasingly, security threats not only come from within your organization but from outside suppliers that have access to critical data or collect critical information. Most partners and vendors will not meet the same security controls and standards as your company does, creating threats and risks that are usually underestimated.

Consequently, third-party risk is increasingly gaining the attention of regulators, risk officers and just about anyone. Your organization is increasingly trusting and sharing information with a broader set of suppliers that consume your information in ways not thought possible a few years ago.

You are using systems everywhere you look to automate work and achieve company goals. The Internet of things, the massive explosion of new social media sites, the growing federation of data to improve marketing and sales, the shift to industry 4.0 and Brilliant Manufacturing are just some of the factors driving this explosive growth.

In a recent study conducted by Softtek’s Supplier Risk Management team we conducted an IT risk assessment across 1,236 services providers, suppliers, contractors, or vendor—from SMEs, to large suppliers with over $50B in revenue—across Europe, Asia, North and Latin America. Interestingly, we found there are wild fluctuations in the way different suppliers and partners from industries treat data security.

Software Development Wins, Lawyers Lose

Third-party risk management has become a top concern in large part due to the increase in hacker sophistication, the rising monetary and reputation costs of breaches, and the consequences of successful cyber-security attacks.

But if you thought your suppliers and partners were becoming more sophisticated and conscientious in their security processes, you’d be mistaken. Our data shows the opposite: third parties are failing at controls more than before.

Best-in-class software development firms feature the highest level of compliance when assessed, outplacing even compliance programs of data processing and data hosting service providers. Every other group has seen a deterioration. In 2015, suppliers complied with 89.7% of all controls, a decline of 3.5% when compared to 2014 scores.

One of the reasons why that’s so has to do with the fact that they tend to have high privileges and may even be operating within your facilities, requiring these vendors to operate under the most stringent compliance conditions of all.

But it’s the lawyers who are giving everybody headaches. The top scoring legal firms rank lowest across all best-in-class groups, excluding companies that just collect information. Legal Services providers manage highly sensitive information, but they often fail to conduct necessary vulnerability assessments of their web or Internet-exposed applications, while we’re entrusting them with ever more sensitive information.

Should you worry? The Panama Leaks in 2016 exposed confidential information of more than 200,000 organizations worldwide.

In another ironic twist, Data Hosting providers have been shown to be vulnerable. This group has the most stringent information security policies. However, 29% of them need to implement auditable processes for secure disposal or wiping of information, as they frequently reuse media across clients they must ensure client data is not recoverable. Many still lack a documented information security incident management process.

In the report we provide a lot more detail, including the security controls we judged and comparisons between third parties in different industries. We discuss best-in-class and worst-in-class supplier types, we help you identify the compliance gaps, and we provide you with the most important questions you need to ask your suppliers to ensure they’re taking care of your data.

Read The State of Digital Third-Party Risk 2016  to get all of the findings, and learn how to keep your data secure by securing your supplier and partner relationships.

Get "The State of Digital Third-Party Risk 2016" report

Related posts

May 15, 2015
IT Risk and Compliance: Interview with IT Risk and Data Expert
Nov 18, 2012
Reducing Breach of Contract Risk as an ITO Provider
Oct 16, 2016
Two Surprising Findings from the 2016 Digital Third Party Risk Report

Let’s stay in touch!

Get Insights from our experts delivered right to your inbox!

Follow us:
Softtek LinkedIn
Softtek Twitter
Softtek Facebook
Softtek Instagram
Softtek Instagram
Follow us:
Softtek LinkedIn
Softtek Twitter
Softtek Facebook
Softtek Instagram
Softtek Instagram

© Valores Corporativos Softtek S.A. de C.V. 2025.
privacy notice
legal disclaimer
code of ethics
our policies
webmaster@softtek.com