"Don’t give anyone the keys to the kingdom. The majority of vendors will only need access to a very small portion of the network so controlling and monitoring their access is vital to maintaining security,” said Boatner Blankenstein (@mtboat), Senior Director of Solutions Engineering for Bomgar. “The ability to track and record their activities will also ensure that any issues can be quickly sourced.”
“Record and monitor everything they do on your systems,” recommended Paul Brady (@ObserveIT), CEO of ObserveIT. There is no question that these vendors need legitimate access to your systems and data, but the risk and liability of not knowing what they are actually doing once they are on your systems is an unacceptable business risk in today’s digital-first world. Read more.