Learn how your organization can protect itself
With increasing frequency, Arctic Wolf’s team of security experts has responded to a new source of business cyber risk: third-party contractors.
Examples from Arctic Wolf’s security team include:
A printer technician’s infected laptop began attacking local systems once hooked up to the printer needing repair
At one company, a risk assessment consultant created unauthorized admin-level accounts in company systems to ease employee work responsibilities—but leave its customers less secure
A security vendor brought in to make improvements misconfigured the client’s IDS and firewall products, exposing the company to attacks
Why Contractors Are Problematic for Cybersecurity
As businesses become more sophisticated about cybersecurity, it is not surprising that third-party contractors now pose a higher percentage of their cyber risk.
While IT departments work diligently to secure their network perimeters and monitor them for cyberattacks, contractors bring unsecured, third-party hardware to business sites and connect them directly to business systems. What’s more, IT departments establish security policies and introduce specific tools to secure employee laptops and other devices, but contractors aren’t required to comply with these policies.
Often, contractors are motivated to simply complete a task as quickly as possible and move along to the next customer. At times, this can lead contractors to act carelessly, cut corners, or violate security policies. To amplify the problem, businesses frequently lack qualified internal staff capable of reviewing a contractor’s activities.
Many companies trust the reputation of the contractor’s organization for protection. But Arctic Wolf security experts found contractor threats from leading companies across multiple industries. Businesses should not assume that contractors and their hardware are secure based on name recognition alone.
1. IT departments should establish security policies for outside contractors and communicate these policies. For example, the department can require that contractor laptops be scanned for vulnerabilities and malware using AV software to meet your company’s IT hygiene standards.
2. IT should implement solutions that can control the scope of a contractor breach. Entitlement management solutions, which provide only fine-grained privileges to specific users, can prevent a contractor from accessing or impacting other business systems. Network segmentation is also key. Contractors should be restricted to company guest networks unless absolutely necessary.
3. IT should adopt a threat detection and response solution. These solutions continuously monitor a business’s network and systems for anomalous activity. In the event that a contractor intentionally or inadvertently attacks or impacts a company’s systems, the breach to be promptly discovered and remediated. This minimizes the business impact of a breach.
For many companies, a managed detection and response (MDR) solution such as the Arctic Wolf SOC-as-a-service may be the best choice for detection and response. It lets companies take advantage of the business benefits of contractors, while affirmatively answering the question: “Am I safe from third-party cyber risk?”