Why Contractors Are Problematic for Cybersecurity
As businesses become more sophisticated about cybersecurity, it is not surprising that third-party contractors now pose a higher percentage of their cyber risk.
While IT departments work diligently to secure their network perimeters and monitor them for cyberattacks, contractors bring unsecured, third-party hardware to business sites and connect them directly to business systems. What’s more, IT departments establish security policies and introduce specific tools to secure employee laptops and other devices, but contractors aren’t required to comply with these policies.
Often, contractors are motivated to simply complete a task as quickly as possible and move along to the next customer. At times, this can lead contractors to act carelessly, cut corners, or violate security policies. To amplify the problem, businesses frequently lack qualified internal staff capable of reviewing a contractor’s activities.
Many companies trust the reputation of the contractor’s organization for protection. But Arctic Wolf security experts found contractor threats from leading companies across multiple industries. Businesses should not assume that contractors and their hardware are secure based on name recognition alone.
Three key practices are central to contractor risk mitigation
1. IT departments should establish security policies for outside contractors and communicate these policies. For example, the department can require that contractor laptops be scanned for vulnerabilities and malware using AV software to meet your company’s IT hygiene standards.
2. IT should implement solutions that can control the scope of a contractor breach. Entitlement management solutions, which provide only fine-grained privileges to specific users, can prevent a contractor from accessing or impacting other business systems. Network segmentation is also key. Contractors should be restricted to company guest networks unless absolutely necessary.
3. IT should adopt a threat detection and response solution. These solutions continuously monitor a business’s network and systems for anomalous activity. In the event that a contractor intentionally or inadvertently attacks or impacts a company’s systems, the breach to be promptly discovered and remediated. This minimizes the business impact of a breach.
For many companies, a managed detection and response (MDR) solution such as AWN CyberSOC™ may be the best choice for detection and response. It lets companies take advantage of the business benefits of contractors, while affirmatively answering the question: “Am I safe from third-party cyber risk?