BusinessCybersecurityNewswireSecurity

Third-Party Data Breaches Surge, Impacting Multiple Industries

▼ Summary

– Supply chain cyber risks are a major concern for CISOs, but current management strategies aren’t keeping up with growing threats.
– Third-party breaches have doubled (15% to 30%), with a few key providers creating concentrated risks that can disrupt thousands of organizations.
– Most companies lack visibility into deeper supply chain layers, and 62% report less than half of vendors meet their security standards.
– Current risk management is often passive, relying on outdated methods like assessments rather than active monitoring and incident response.
– SOC teams are overwhelmed by data and vendor non-responsiveness, hindering effective threat prioritization and third-party risk management.

The growing threat of third-party data breaches continues to disrupt businesses across multiple sectors, exposing critical vulnerabilities in supply chain security. Recent findings highlight how organizations struggle to keep pace with escalating cyber risks tied to vendor networks, leaving them exposed to cascading threats.

Third-party breaches have surged dramatically, jumping from 15% to nearly 30% of incidents in recent years. This spike underscores a dangerous concentration of risk, where a handful of service providers support vast segments of global infrastructure. When attackers compromise just one of these vendors, the fallout can ripple through thousands of dependent businesses. Cybercriminals increasingly target these weak links, recognizing that breaching a single supplier can unlock access to multiple high-value targets.

Despite the clear danger, many companies fail to monitor deeper layers of their supply chains, leaving critical systems unprotected. Shockingly, over 60% of organizations admit that fewer than half of their vendors meet basic cybersecurity standards. This gap creates a glaring weak spot, as attackers exploit overlooked vulnerabilities in third-party networks.

Experts warn that traditional risk management approaches, relying on compliance checklists and periodic assessments, are no longer sufficient. Supply chain attacks aren’t hypothetical; they happen daily,” notes a leading threat intelligence officer. “Passive monitoring won’t cut it, real-time detection and response are essential.”

Even companies with established risk programs often lack proactive defenses. Few invest in vendor-specific incident response plans or continuous monitoring, instead relying on outdated self-assessments that provide limited visibility. Meanwhile, security teams grapple with overwhelming workloads, struggling to prioritize threats amid data overload.

Collaboration between security operations and risk management teams remains a critical hurdle. When vendors ignore assessment requests or delay responses, security teams lose crucial insights needed to mitigate threats. The solution? A shift toward active defense strategies that integrate real-time threat intelligence with automated response capabilities. Only by closing this gap can businesses hope to outmaneuver increasingly sophisticated supply chain attacks.

The message is clear: static security measures won’t stop dynamic threats. Organizations must evolve beyond compliance checklists and embrace integrated, actionable defenses to safeguard their supply chains, before the next breach strikes.

(Source: HELPNETSECURITY)

Topics

supply chain cyber risks 95% third-party breaches 90% lack supply chain visibility 85% inadequate vendor security standards 80% passive risk management 75% overwhelmed soc teams 70% need active defense strategies 65% integration threat intelligence 60%
Show More

The Wiz

Wiz Consults, home of the Internet is led by "the twins", Wajdi & Karim, experienced professionals who are passionate about helping businesses succeed in the digital world. With over 20 years of experience in the industry, they specialize in digital publishing and marketing, and have a proven track record of delivering results for their clients.
Close

Adblock Detected

We noticed you're using an ad blocker. To continue enjoying our content and support our work, please consider disabling your ad blocker for this site. Ads help keep our content free and accessible. Thank you for your understanding!