August

NIST ID.SC-1

“Building a Human Firewall”

Third-Party Risk

Your security is only as strong as the weakest vendor you use. A single compromised 'helper' tool can act as a Trojan Horse, bypassing all of your internal defenses.

Cautionary tale: The SolarWinds Supply Chain Trojan

In 2020, hackers compromised SolarWinds, a software provider. They hid a “backdoor” inside a legitimate software update. When 18,000 customers—including the US Treasury and major Fortune 500 firms—downloaded the “trusted” update, they unknowingly granted hackers full access to their private networks.

The Lesson: Implicit trust in a vendor is a vulnerability. Organizations must assume that even 'signed' updates from reputable providers could potentially be compromised.

Understanding Third-Party Risk

Hackers often target smaller vendors to reach larger, “unhackable” clients.

  • Supply Chain Attacks: Compromising the software or services we buy to gain a foothold in our network.

  • Shadow IT: Using unvetted browser extensions, PDF converters, or “free” project tools that haven’t been cleared by IT.

  • Data Sprawl: Sharing company data with vendors who have weaker security standards than our own.

Spotting the Signs

  • Unapproved Plugins: Browser extensions asking for permission to “read and change all your data on all websites.”

  • Unsolicited Updates: A website or tool prompting you to download a “new version” outside of our standard management software

  • Excessive Permissions: A simple utility app asking for access to your entire contact list or file system.

August Security Checklist

  • Stick to Approved Apps: Only use software listed in the company “Service Catalog” or approved by IT.

  • Audit Your Extensions: Remove any browser extensions you haven’t used in the last 30 days.

  • Vetting Matters: Before signing up for a “free” trial of a new AI or productivity tool, submit it to the Security Team for review.

Symbol Security

Ready to Implement This Month's Security Focus?

Deploy automated security awareness training with Symbol Security. Schedule simulations, track progress, and measure improvement across your organization.