CONTACT US
Third Party Risk Management - Consultancy, Assessment & Advisory

Third Party Risk Insights August 2020

This Month's Key Third Party Risk Management Articles & Reports

European Data Protection Board offers FAQ on Schrems EU-US Data protection judgement

Following the recent Data Protection Commissioner v Facebook Ireland Ltd and Maximillian Schrems judgement on the adequacy of the protection provided by the EU-US Data Protection Shield the EDPB issued an FAQ to provide clarity on the ruling and key regulatory impacts. Download the FAQ

Lessons Learned From The Garmin Cyberattack

Cybersecurity Ratings partner BitSight looks at how the recent high profile targeting of a consumer-services company like Garmin should serve as notice to CISO’s and business leaders everywhere that it’s time to start paying your attack surface the attention it deserves. Read the full article.

Gartner Names ProcessUnity a Leader in the 2020 Gartner Magic Quadrant for IT Vendor Risk Management Tools

Congratulations to our technology partner ProcessUnity on receiving two accolades from Gartner.

Gartner has named ProcessUnity a Leader in the 2020 Gartner Magic Quadrant for the 2nd consecutive year AND gave them the highest score for use case in the 2020 Gartner Critical Capabilities for IT Vendor Risk Management Tools. Learn more and Download the report

You’re Only As Strong As Your Weakest Link

Third-Party breaches & Cyber Supply Chain issues that caught our eye

Data Security and Privacy Gaps Found in Video Doorbells by Consumer Reports' Tests

Video doorbells make it easy to see who’s at your door, a convenience that provides a sense of security. But like any internet-connected security camera, they’re also susceptible to hacking. So as part of Consumer Reports’ ongoing efforts to protect consumers from hackers, they recently conducted data security and data privacy tests on the 24 video doorbells in the Consumer Reports ratings, including five new models. See the full article.

Remote Exploit Flaw Found in Millions of Connected IoT Devices

An IoT vulnerability has been uncovered in a host of Thales products, which are found in millions of connected devices, including medical devices, and can be remotely exploited.

IBM X-Force Red security researchers uncovered a bug in components made by the manufacturer Thales. The IoT vulnerability can be remotely exploited, allowing a hacker to take control of the device or access the enterprise network. Learn more.

Promo, "the world’s #1 marketing video maker” reveals a vulnerability in a third-party service led to breach of 14.6m users.

An Israeli marketing video firm this week announced a major breach of user data which appears to have impacted over 14 million accounts.

Promo, which describes itself as “the world’s #1 marketing video maker,” revealed in an online notice that a vulnerability in a third-party service was to blame for the incident, which also affected customers of its Slidely business. Read on.

Learn more about how DVV Solutions Third Party risk managed services can help you achieve operational resilience and enhance oversight in your cyber supply chain.

Call today 0161 476 8700

or Submit a Contact Form

Download