ExtraHop’s Post

View organization page for ExtraHop, graphic

33,697 followers

“Customers experience heightened risk when third-party vendors have expansive privileges to their operational environments. Unfettered access leaves a clear pathway for attacks to have ripple effects across customer network environments, exposing their sensitive information and possibly impacting their daily operations.” - Jamie Moles via SC Media https://xtra.li/3XxGXS8

After 2 hacks, CDK Global warns customers of social-engineering attacks

After 2 hacks, CDK Global warns customers of social-engineering attacks

scmagazine.com

Great point, Jamie! Ensuring third-party vendors have only the necessary access and implementing strict monitoring can significantly mitigate these risks. What strategies do you recommend for effectively managing and auditing third-party access?

To view or add a comment, sign in

Explore topics