SlideShare a Scribd company logo
62%
About SecureLink
Businesses rely on the SecureLink platform to bridge the gap between enterprise technology
vendors and their customers. The SecureLink solution streamlines support operations and
reduces liability for vendors while ensuring security, accountability, and compliance for their clients.
Recognized as experts in third party vendor access and remote support, SecureLink serves more
than 30,000 organizations globally. Founded in 2003, the company is privately owned and based
in Austin, Texas.
COMMON EXPLOITS
THIRD-PARTY REMOTE SUPPORT THREATS
Vendor Access Process Risks
of 450 data breaches
studied were linked to a
third-party component of IT
system administration
②
of security leaders strongly agreed that the risk level to their
organization was increasing due to the number of interactions
and connections with customers, suppliers and partners.
①
“A firm’s level of cybersecurity is only as good as the cybersecurity of its vendors.”
Benjamin M. Lawsky, New York State's first Superintendent of Financial Services
①
IBM CISO Assessment, 2014
②
Trustwave Global Security Report, 2013
③
CyberArk All Access Pass, 2014
④
Spiceworks Voice of IT Panel - VPN Survey
⑤
Gartner: 2014 CIO Agenda
⑥
EiQ Networks Survey, 2014
⑦
PWC Global State of Information Security Survey, 2015
Sources:
of the network managers
who allow VPN access state
their vendors can access
department-specific
business applications (i.e.
database software,
accounting software)④
“Backoff” (POS malware)
of all targeted cyber attacks
exploit privileged accounts
during the attack process③
November 2013
40,000,000
Credit Cards
July 2014
868,000
Payment Cards
September 2014
56,000,000
Credit Cards
May 2011
150
Locations
October 2014
216
Locations
42%don’t feel they have the
right skills and
capabilities to prevent
breach⑤
9%of security leaders
name CPO as top
strategic partner①
15%believe their
organizations are
“well prepared” for a
security breach⑥
Vulnerabilities
Shared credentials / Privileged accounts
Limited Audit and Accountability
NOTABLE BREACHES
63%
Personnel Risks
The Future
Virtual Private Network (VPN) Desktop Sharing
conducted an inventory of all third parties that
handle personal data of employees and customers⑦
do not perform risk assessments on third- party
vendors (up from 47% in 2013)⑦
SecureLink, Inc. 12600 Hill Country Blvd. Suite 200, Austin, TX 78738
ofc: 512.637.8700 // fax: 512.637.8701 // securelink.com
50% of IT professionals feel unprepared
infections
of businesses②
1000
80%
2/3
Vulnerabilities
Easy target for Hackers
Full network access / credentials
that originated from stolen third-party credentials or the
exploitation of desktop sharing tools used for third-party remote support.

More Related Content

PPTX
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
DOCX
“Verify and never trust”: The Zero Trust Model of information security
PPTX
Information Security Management System in the Banking Sector
PDF
Healthcare Cybersecurity Survey 2018 - Sirius
PPTX
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
PDF
BAI Security - Brochure - Compromise Assessment
PPTX
10 Critical Corporate Cyber Security Risks
PDF
Octree securapro mauleverer case study
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
“Verify and never trust”: The Zero Trust Model of information security
Information Security Management System in the Banking Sector
Healthcare Cybersecurity Survey 2018 - Sirius
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
BAI Security - Brochure - Compromise Assessment
10 Critical Corporate Cyber Security Risks
Octree securapro mauleverer case study

What's hot (18)

PDF
Forrester no more chewy centers- the zero trust model
PPT
Security and information assurance
PPTX
What is zero trust model (ztm)
PPTX
Cyber security cgi moving forward
PDF
The Seven Kinds of Security
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
Netpluz Managed SOC - MSS Service
PPTX
The State Of Information and Cyber Security in 2016
PDF
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
PPTX
Global Cybersecurity Market (2017 - 2022)
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPTX
The Top Three 2021 Cyber Threats
PDF
Application Security
PDF
SME Cyber Insurance
PDF
2016 Gaming Industry Intelligence Package
PDF
Alien vault sans cyber threat intelligence
PDF
From Business Architecture to Security Architecture
PDF
Fighting The Top 7 Threats to Cloud Cybersecurity
Forrester no more chewy centers- the zero trust model
Security and information assurance
What is zero trust model (ztm)
Cyber security cgi moving forward
The Seven Kinds of Security
Application Security | Application Security Tutorial | Cyber Security Certifi...
Netpluz Managed SOC - MSS Service
The State Of Information and Cyber Security in 2016
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Global Cybersecurity Market (2017 - 2022)
VAPT - Vulnerability Assessment & Penetration Testing
The Top Three 2021 Cyber Threats
Application Security
SME Cyber Insurance
2016 Gaming Industry Intelligence Package
Alien vault sans cyber threat intelligence
From Business Architecture to Security Architecture
Fighting The Top 7 Threats to Cloud Cybersecurity
Ad

Similar to Third-party Remote Support Threats Inforgraphic (20)

PDF
Cybersecurity Slides
PDF
Strong authentication implementation guide
 
PDF
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
PDF
ThreatMetrix Profile in March 2014 CIO Review
PDF
ThreatMetrix Profile in March 2014 CIO Review
PDF
Icit analysis-identity-access-management
DOCX
What you need to know about cyber security
PDF
Improve network safety through better visibility – Netmagic
PDF
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
PPTX
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PDF
BEST CYBER SECURITY PRACTICES
PDF
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
PPTX
Securing the Cloud
PDF
Insights into cyber security and risk
 
PDF
Understanding Identity Management and Security.
PDF
Application Security: Safeguarding Data, Protecting Reputations
PDF
Information Technology Security Is Vital For The Success...
PDF
How to reduce security risks to ensure user confidence in m-payments
PDF
Top 5 Cybersecurity Risks in Banking
PDF
Cybersecurity in Banking Sector
Cybersecurity Slides
Strong authentication implementation guide
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO Review
Icit analysis-identity-access-management
What you need to know about cyber security
Improve network safety through better visibility – Netmagic
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
BEST CYBER SECURITY PRACTICES
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Securing the Cloud
Insights into cyber security and risk
 
Understanding Identity Management and Security.
Application Security: Safeguarding Data, Protecting Reputations
Information Technology Security Is Vital For The Success...
How to reduce security risks to ensure user confidence in m-payments
Top 5 Cybersecurity Risks in Banking
Cybersecurity in Banking Sector
Ad

Third-party Remote Support Threats Inforgraphic

  • 1. 62% About SecureLink Businesses rely on the SecureLink platform to bridge the gap between enterprise technology vendors and their customers. The SecureLink solution streamlines support operations and reduces liability for vendors while ensuring security, accountability, and compliance for their clients. Recognized as experts in third party vendor access and remote support, SecureLink serves more than 30,000 organizations globally. Founded in 2003, the company is privately owned and based in Austin, Texas. COMMON EXPLOITS THIRD-PARTY REMOTE SUPPORT THREATS Vendor Access Process Risks of 450 data breaches studied were linked to a third-party component of IT system administration ② of security leaders strongly agreed that the risk level to their organization was increasing due to the number of interactions and connections with customers, suppliers and partners. ① “A firm’s level of cybersecurity is only as good as the cybersecurity of its vendors.” Benjamin M. Lawsky, New York State's first Superintendent of Financial Services ① IBM CISO Assessment, 2014 ② Trustwave Global Security Report, 2013 ③ CyberArk All Access Pass, 2014 ④ Spiceworks Voice of IT Panel - VPN Survey ⑤ Gartner: 2014 CIO Agenda ⑥ EiQ Networks Survey, 2014 ⑦ PWC Global State of Information Security Survey, 2015 Sources: of the network managers who allow VPN access state their vendors can access department-specific business applications (i.e. database software, accounting software)④ “Backoff” (POS malware) of all targeted cyber attacks exploit privileged accounts during the attack process③ November 2013 40,000,000 Credit Cards July 2014 868,000 Payment Cards September 2014 56,000,000 Credit Cards May 2011 150 Locations October 2014 216 Locations 42%don’t feel they have the right skills and capabilities to prevent breach⑤ 9%of security leaders name CPO as top strategic partner① 15%believe their organizations are “well prepared” for a security breach⑥ Vulnerabilities Shared credentials / Privileged accounts Limited Audit and Accountability NOTABLE BREACHES 63% Personnel Risks The Future Virtual Private Network (VPN) Desktop Sharing conducted an inventory of all third parties that handle personal data of employees and customers⑦ do not perform risk assessments on third- party vendors (up from 47% in 2013)⑦ SecureLink, Inc. 12600 Hill Country Blvd. Suite 200, Austin, TX 78738 ofc: 512.637.8700 // fax: 512.637.8701 // securelink.com 50% of IT professionals feel unprepared infections of businesses② 1000 80% 2/3 Vulnerabilities Easy target for Hackers Full network access / credentials that originated from stolen third-party credentials or the exploitation of desktop sharing tools used for third-party remote support.