Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Enforce Cybersecurity When Managing Third-Party Data
Data

How to Enforce Cybersecurity When Managing Third-Party Data

Wayne SadinBy Wayne SadinFebruary 28, 20236 Mins Read
Facebook Twitter LinkedIn Email
third-party data
Share
Facebook Twitter LinkedIn Email

We live in an interconnected world. Every organization connects to vendors, customers, and other stakeholders. And in today’s Acceleration Economy, those connections take the form of data movement into and out of your organization.

This means it’s not enough to have a data security strategy that applies to your data and your employees: Your data security strategy, a core component of your overall data strategy, must extend beyond your four walls to encompass every data channel and recognize the security postures of every counterparty.

In this analysis, I’m going to break down the types of third-party data that your organization is likely to be involved in receiving, validating, and securing today. Then I’ll share ideas on some emerging risks. In all cases, I’m presenting ways to address the challenges that commonly arise.

Start Simple: Incoming Data Issues

As you begin to take inventory of third-party data and types you will need to manage, start with a simple case: incoming data from a partner. Maybe it’s your bank sending daily positive pay files or a supplier sending shipment data and invoices. Hey, these are good solid firms, and you know and trust them . . . what could go wrong?

Let’s look at some possibilities. (Please note this list is hardly exhaustive. The real world of data is messy, and the cybersecurity attack surface is ever-expanding.)

A Compromised Connection

Are you sure the file you just received is legit . . . or are you being spoofed by an impostor?

Potential Fix: out-of-band (for example, via email) pre-notification of each transmission (including checksums), plus file encryption.

A Too-Permissive Connection

A too-permissive connection allows for unauthorized use. Remember Target’s customer account breach? A connection to a repair vendor allowed an intruder to enter Target’s infrastructure and traverse the network until it found a juicy target.

Potential Fix: It’s called “zero trust,” which means allowing access to only what is required based on identity (who), function (what), location (where), and so on. If you’re expecting shipment data, the connection only goes to the enterprise resource planning (ERP) order management module and nowhere else.

Compromised Data

There are many ways incoming data can cause problems. There are simple errors, including a daily file that doesn’t come in one day; or an empty file; or a duplicate of yesterday’s file (or last Tuesday’s); or the data format changes without notice. Some errors are more subtle but potentially more malicious, such as data deliberately crafted to compromise your systems or data maliciously changed to disrupt your operation.

Potential Fix: Quarantine incoming data and automatically run data quality checks before releasing the data into your processing systems.

Which companies are the most important vendors in data? Click here to see the Acceleration Economy Top 10 Data Modernization Short List, as selected by our expert team of practitioner-analysts

Online Transactions Add Additional Risks

If we’re dealing with online transactions that flow into your systems from counterparties, things get riskier and more complex. Here are some factors to consider.

Validation for Numerous Participants

If your transaction system allows numerous participants, how are you validating each of them each time they connect?

Potential Fix: Automate the heck out of all the checks you do for the simple case and run them wherever and whenever necessary.

Dropped Connections

How do you handle transaction failures, where some data is received but the connection drops?

Potential Fix: Modern databases have built-in tools to handle “commit and rollback” situations, so security, compliance, and data teams must get together to agree on error handling processes.

See the Data Modernization Top 10 shortlist

Surge Volumes

Do your networks and network security tools have adequate capacity to handle “surge volumes” (after a holiday, at a specific time of day, at halftime on Superbowl Sunday, after a distributed denial of service attack)?

Potential Fix: Model expected maximum volumes, then build in a safety factor of 2x or more. Contract with third-party network vendors that reject excessive spurious transactions. Stress test your systems to ensure they “degrade gracefully” (which is bad) rather than collapse or stop protecting (which is even worse) under pressure.

Emerging Third-Party Data Risks

Again, I just scratched the surface when listing online threats…but it gets worse. Traditional data security addresses files or transactions from people or other IT systems. In the “Internet of Things” (IoT) world, the data streams are coming from and going to devices. When monitoring and controlling devices, situations arise in addition to those listed above. There are two final considerations that I urge you to address.

The Need to Accommodate Delays

IoT transactions are often what’s called “hard real-time,” which means the machine sending data needs a response within a specific timeframe — usually a few milliseconds or even less — or something terrible will happen. If a drone detects an obstacle in its path, the “obstacle” message needs to be received and a “turn left” message sent back (and received by the drone) in perhaps a fraction of a second. That’s just as true for a check sorter at a bank, a lathe in a factory, or a power plant safety system.

Potential Fix: Design the data path with adequate safety margins to accommodate delays. And design IoT systems to be “casually connected,” which means they can function in a limited manner, or even go idle, if the connection slows down or stops (see “degrade gracefully” as I explained above).

Recent troubling developments compel me to include one more class of third-party data risk:

IT Supply Chain Compromise

An IT supply chain compromise is what happened to SolarWinds customers. A modern IT department acquires many software tools. Suppose an evildoer penetrates a software platform (exploiting one of the vulnerabilities listed above or others) and inserts malicious code into the vendor’s product. In that case, hundreds or thousands of firms are at risk.

Potential Fix: A compromised software tool can expose an organization to many kinds of risk. This analysis covers data security risks, so we’ll focus on one such example: data exfiltration, in which confidential data is scooped up and transferred to an evildoer’s data repository. If you follow zero trust principles, you can limit your damage. SolarWinds is a network monitor; it analyzes network traffic, looking for delays and problems moving data (ironically, it’s helpful to mitigate risks caused by surge volumes). A Zero Trust architecture would limit the tool to only look at messages flowing through the network, then block (and report) attempts to access data files on servers or send those data files outside the internal network.

Final Thoughts

Think back to the days of handwritten airplane tickets and manual credit card imprinters (anyone remember that “ca-chunk” sound?). Transactions took days or weeks to move between organizations. In today’s Acceleration Economy, that would be unacceptable! Today, every organization exchanges data with numerous third parties. Those data flows improve productivity and quality while decreasing costs and cycle time.

As we’ve seen, third-party data exchanges can be quite complex. The real world of data security must allow for many things to go wrong — whether through accident or deliberate action. Organizations must look inward, and at every connection with every third party, to adequately protect against the diverse threats they face.


Want more insights into all things data? Visit the Data Modernization channel:

Data Modernization Channel Logo

breach Compliance customer data database featured Internet of Things IoT supply chain vulnerability
Share. Facebook Twitter LinkedIn Email
Analystuser

Wayne Sadin

CIO, PriceSmart
Cloud Wars Advisory Board Member

Areas of Expertise
  • Board Strategy
  • Cybersecurity
  • Digital Business
  • Website
  • LinkedIn

Wayne Sadin, a Cloud Wars analyst focused on board strategy, has had a 30-year IT career spanning logistics, financial services, energy, healthcare, manufacturing, direct-response marketing, construction, consulting, and technology. He’s been CIO, CTO, CDO, an advisor to CEOs and boards, Angel Investor, and independent director at firms ranging from start-ups to multinationals.

  Contact Wayne Sadin ...

Related Posts

Workday Dismisses Agentic AI Arms Race, Focuses on Business Impact

May 16, 2025

Workday Lone Wolf: Focuses on 8 AI Agents vs. Competitors’ Hundreds

May 16, 2025

C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future

May 15, 2025

AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills

May 15, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Workday Dismisses Agentic AI Arms Race, Focuses on Business Impact
  • Workday Lone Wolf: Focuses on 8 AI Agents vs. Competitors’ Hundreds
  • C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future
  • AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills
  • Microsoft’s Mission to Make Your Company AI First

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.