50% of large enterprises view third-party partners of any size as a cybersecurity risk, but only 14% have experienced a breach as the result of a small business partner, while 17% have been breached as the result of working with a larger partner, according to ISC2.
risk, supply chain, cybersecurity
The study surveyed more than 700 respondents at both small businesses and large enterprises to learn how data sharing risk is perceived.
These findings contradict the widely-held belief that small businesses serve as the easiest conduit for cyberattacks on large enterprises.
The reality is that large enterprises are nearly unanimously confident (94% of survey respondents indicated that they are “confident” or “very confident”) in their small business partners’ cybersecurity practices, and 95% have a standard process for vetting their suppliers’ cybersecurity capabilities.
“This research highlights the fact that building a strong cybersecurity culture and subscribing to the right best practices can help organizations of any size maximize their security effectiveness,” said ISC2 COO Wesley Simpson.
“It’s a good reminder that in any partner ecosystem, the responsibility for protecting systems and data needs to be a collaborative effort, and multiple fail safes should be deployed to maintain a vigilant and secure environment. The blame game is a poor deterrent to cyberattacks.”
Lax access management controls
Nearly two-thirds (64%) of large enterprises outsource at least one-quarter (26%) of their daily business tasks, which requires them to allow third-party access to their data. These outsourced functions can include anything from research and development, to IT services and accounts payable.
This data access and sharing is necessary as a large enterprise scales its operations, but the ISC2 research indicates that access management and vulnerability mitigation is often overlooked.
34% of large enterprises say they have been surprised by the broad level of access a third-party provider has been granted to their network and data
39% of small businesses expressed the same surprise about the access they were granted when providing services to large enterprise partners
Even worse, 35% of large enterprises also admitted that when alerted by a third party to insecure data access policies, nothing changes in the large enterprise’s practices
More than half (55%) of small business respondents reported that they still had access to a client’s network or data after completing a project or contract
54% of small businesses have been surprised by some of their large enterprise clients’ inadequate security practices, and 53% have provided notification of security vulnerabilities they’ve discovered in large enterprise networks to which they have access
Investment in cybersecurity teams
The report also found that while small businesses have fewer employees overall, the proportion of their cybersecurity staff isn’t necessarily lower than in large enterprises. The study shows that nearly half (42%) of small businesses, with 250 or fewer workers, employ at least five dedicated cybersecurity staff.
By comparison, 75% of large enterprises, with over 1,000 employees, have at least 10 staff members focused on cybersecurity. While many large enterprises may have more cybersecurity staff by volume, some small businesses have a higher percentage of security professionals working to implement best practices and defend data and networks.
- ISO 27001 Lead Implementer
- Chief Information Security Officer (CCISO)
- CyberSecurity Professional
- CyberSecurity Lead Implementer
- Cybersecurity Lead Auditor
- ISO 27001 Lead Auditor
(2019). How much risk small businesses really pose to supply chain cybersecurity? Recovered on 28 October 2019 from https://www.helpnetsecurity.com/2019/06/25/risk-small-businesses/