‘Here be Dragons’: the risks of outsourcing data to third parties

BY DAMIEN BEHAN AND ALISDAIR MATHESON

We live in what would, to our 10-year-old selves, have seemed liked a science fiction future. An amazing inter-connected world where goods and services are just a few clicks away, the sum total of human knowledge is available from your smartphone, and in which, thanks to the internet ‘intelligent’ fridges will soon be able to order our groceries. However, with that flexibility and convenience come new opportunities for criminals and hackers, and the need for a much greater awareness of security.

As organisations become more focused on their value-add to customers, technology makes it ever-easier to outsource non-core activities to third parties. Modern businesses rely heavily on outsourcing, whether for software development, cloud computing or even legal services. However, each time access to your data or to your premises is granted, whether onsite or via a remote data centre, risks can arise.

WHILE MODERN technology enables flexibility, it creates new weaknesses, often in unexpected ways. A pertinent example was the data breach suffered by the US high street retailer Target in late 2013, in which millions of its customers’ payment card details were stolen by hackers. The criminals stole the login credentials of a third-party supplier that looked after Target’s refrigeration, heating, ventilation and air conditioning systems. The network access the supplier had been granted to maintain these systems ultimately allowed hackers to install malware on card readers in Target’s shops to harvest customers’ card details. The direct cost to Target as of late 2015 was somewhere in the region of $162 million, plus a further $90 million in insurance claims, and significant damage to its brand.

Alisdair Matheson

Alisdair Matheson

Damien Behan

Damien Behan

 

SO HOW DO you protect your business from third party supplier risk? Firstly, make sure you set out clearly what you are responsible for in any contract with people whom you supply. Make sure you do the same with your own suppliers’ contracts and provide minimum standards and suitable indemnities for any loss or compromise of data you provided to them, and indemnities relative to your systems should something go wrong. Though relatively new, cyber cover will become as common as property or business interruption insurance and will mitigate the cost and impact of cyber breaches.

If you grant access to your premises or systems, restrict what the supplier can do using a “least privilege” approach – they should have access to carry out their contracted duties, but nothing more. Ensure that staff are vetted and trained in data security, and that they are aware of your own policies. Finally, audit your suppliers. Each supplier is different, and your sandwich provider will obviously require a different level of scrutiny to your payroll or data centre provider, so assess the risk on a case-by-case basis. Look for evidence of compliance with recognised industry standards, such as ISO 27001: 2013 or Cyber Essentials Plus, which demonstrate a mature approach to security in their business. While this new world is exciting and fast moving, there is also a potential for damage to the reputation, and even the existence, of your business. Like the pioneering ancient mariners who explored uncharted territories adorned with sea monsters on their maps, heed the warning – Here Be Dragons.


Damien Behan, IT Director, Brodies LLP and Alisdair Matheson, Partner, Dispute Resolution & Litigation, Brodies LLP. For more information, contact Alisdair on 0141-245 6762 or at alisdair.matheson@brodies.com.

Tags: