A broken link involving just one of your suppliers can send security concerns down your entire chain. The purpose of this whitepaper is to understand and reveal more about the relationship between organisations and third-party suppliers when it comes to cybersecurity. It also looks at data breach risk and response, and the impact on and views of consumers.
What does this whitepaper discuss:
Data Breach: Supply Chain Risk
Data Breach:
Supply Chain Risk
A broken link involving just one of your suppliers can send security concerns down your entire chain. The purpose of this whitepaper is to understand and reveal more about the relationship between organisations and third-party suppliers when it comes to cybersecurity. It also looks at data breach risk and response, and the impact on and views of consumers.
What does this whitepaper discuss:
The growing trend of plans that don’t safeguard businesses or their customers
Is your business really ready for a data breach?
According to our extensive analysis, one in five businesses across different sectors (21%) has experienced a data breach in the past two years, with loss or theft of records containing sensitive or confidential information. This statistic is similar to last year’s findings (23%). Although this may not sound like a hefty figure, the reality is cyber criminals are becoming nimbler by the day. Data breach readiness is therefore a sensible business decision that, as we will discover, is a lot more cost effective than waiting for the worst to happen.
In this whitepaper, we look at how prepared businesses are and how closely aligned this is to consumer expectations. The findings include:
> Response plan effectiveness: While many businesses have plans in place, we analyse if their plans are rigorous enough and if businesses really are as ready as they claim.
> Customer confidence: Maintaining customer trust is of paramount importance to businesses. Many businesses acknowledge this, but do they really take steps to prioritise this? We look at the reputational damage that’s at stake.
> Who's ultimately responsible?: Increasingly it’s IT business decision-makers who are chosen to lead the organisation's breach plans - but are they the right people and ultimately do they understand what this evolving responsibility really entails?
> Across international borders: We assess the state of play of current regulations – and what it means for businesses trading with customers in Europe, and further afield.
Responsibility: When it comes to cyber security, who’s in charge – you or your supplier? And when a data breach happens, who's in charge?
Third-party relationships: Do you really know where your suppliers hold your customer data? How secure is it? And are they GDPR compliant?
Customer conundrum: Customers are placing a lot of trust in organisations when it comes to their data. Is that trust protected by rigorous checks in your supply chain, or is your reputation at stake?
>
>
>
Contact us
If you would like to find out more about how we can help your organisation to Know your threats, Prepare your plans, Recover trust, please fill in the form below and we will contact you shortly.
Contact us
If you would like to find out more about how we can help your organisation to Know your threats, Prepare your plans, Recover trust, please fill in the form below and we will contact you shortly.
Taking control of risk and vulnerabilities
The Taking control of risk and vulnerabilities
0844 4815 888*
We're here weekdays 9am to 5pm.
0844 4815 888*
We're here weekdays 9am to 5pm
© 2019 Experian. All rights reserved.
Legal Terms & Conditions | Privacy policy | Cookies
*Calls cost 7p per minute plus your company's access charge
Experian Ltd is authorised and regulated by the Financial Conduct Authority. Experian Ltd is registered in England and Wales under company registration number 653331. Registered office address:
The Sir John Peace Building, Experian Way, NG2 Business Park, Nottingham, NG80 1ZZ.