Share this
Trusting Vendors With Your Data: The Importance of SOC 2 Compliance
by Kory Underdown on Dec 14, 2022 12:00:00 AM
Your cybersecurity strategy should begin with DNS filtering, but it definitely shouldn’t end there. In fact, your strategy needs to include more than just the security platforms and safeguards your own organization uses— it needs to include your vendors as well.
Third-party vendors are a requirement for any business to run smoothly, but in utilizing vendors, you’re also sharing your data with them. How much access do they have? The average organization utilizes somewhere between 250 and 500 third-party vendors. If each of those vendors also uses 250 vendors, you can see how your data can quickly be caught inside a very messy web.
Do you trust that vendors are keeping your data secure?
Or are they putting your data at risk of being part of a breach?
It takes an average of 277 days for an organization to find out that their data has been breached via a third-party. Bad actors have it easy when they’re able to breach a vendor — why gain access to only one organization’s data when you could gain access to all of their customers?
How do these breaches happen? A few ways:
Phishing— Lack of employee security awareness training and DNS security leaves an organization open to phishing attacks. From here, bad actors gain employee credentials or access to the company’s network.
Malware— Lack of anti-virus and DNS security on endpoint devices leaves you open to malware and allows malicious access to your network.
Lack of encryption— Leaving data unencrypted, either on a drive or in the process of transmitting to a vendor, can lead to stolen credentials and internal threats because sensitive data is easily accessible
Poor password management— Storing passwords in plaintext, reusing passwords across websites, not using multi-factor authentication, and post-it notes, oh my! Hacking software can guess billions of password combinations in seconds. Once they have yours, bad actors are able to log right into your network.
How do you ensure your third-party vendors won’t fall victim to a breach?
The short answer: Vet their security strategy.
As you can imagine, vetting 250-500 vendors’ security strategies is a major task. However, some compliance certifications show that an auditor did that vetting for you.
SOC 2 Compliance
SOC 2 (Systems and Organization Controls 2) is a security framework that organizations should follow to ensure they’re protecting customer data and mitigating vulnerabilities.
SOC 2 compliance ensures that an organization has defined their security policies and processes under the 5 Trust Services Criteria, and that they actually follow them.
5 Trust Services Criteria:
- Security
- Privacy
- Processing Integrity
- Confidentiality
- Availability
All 5 criteria do not necessarily apply to every organization, but every SOC 2 report includes the Security criteria. If others are applicable, those must be included in their report as well.
Utilizing SOC 2 compliant vendors should be part of your cybersecurity strategy
Your cybersecurity strategy should not be limited to the policies you have in place. It shouldn’t end with how you handle your own data or how you train employees.
It’s growing increasingly important to consider how your third-party vendors are handling your data, as well.
Committing to utilizing vendors that can prove they’ve done the work to create and follow effective security processes and policies reduces the ease of bad actors looking to gain access to your data. When layered with a DNS filtering service, firewalls, least-privileged data access, and employee training, this step helps keep your organization safer than most.
Obviously this is not a guarantee that your data will never be compromised, but it is an important piece of the puzzle.
Learn more about the importance of SOC 2 in this on-demand webinar, Trusting Vendors With Your Data: The Importance of SOC 2 Compliance.
Share this
Categories
- Featured (267)
- Protective DNS (23)
- IT (15)
- IndyCar (9)
- Content Filtering (8)
- AI (7)
- Cybersecurity Brief (7)
- IT Challenges (7)
- Public Wi-Fi (7)
- Deep Dive (6)
- Malware (4)
- Roaming Client (4)
- Team (4)
- Compare (3)
- MSP (3)
- Machine Learning (3)
- Phishing (3)
- Ransomware (3)
- Tech (3)
- Anycast (2)
- Events (2)
- Staying Ahead of Cyber Threats (2)
- Tech Stack (2)
- Secure Web Gateway (1)

Your firewall is working hard… but not smart. And cybercriminals love that.
Like a bouncer at the club with a clipboard—great at stopping the obvious troublemakers that aren’t on the list, but completely oblivious to unknown threats. They excel at blocking unauthorized access through known ports and protocols, but they often overlook a critical vulnerability: DNS traffic and what’s on the other side of a link. This oversight allows cybercrimina...

Introduction: The AI Cybersecurity Arms Race
Artificial intelligence (AI) has transformed the cybersecurity landscape—both for defenders and attackers. While AI-powered cybersecurity solutions offer advanced threat detection, AI-driven cybercrime is evolving at an alarming rate, automating attacks that are more sophisticated, evasive, and dangerous.

Imagine waking up to find your company's most sensitive data exposed, your systems locked, and your reputation in tatters. This nightmare scenario isn't just a hypothetical—it's the reality for businesses falling victim to zero-day attacks. In 2021, four zero-day exploits targeting Microsoft Exchange servers affected over 250,000 organizations worldwide, leaving countless systems vulnerable to data theft and ransomware.