Remove Audit Remove Evaluation Remove Manufacturing Remove Outsourcing
article thumbnail

Tips for Managing Third-Party Risk in Health Care

Reciprocity

Several device manufacturers provide remote support but don’t always follow good cybersecurity hygiene. A common mistake is granting device manufacturers VPN access with open elevated privileges. Site content audits and script monitoring also help manage and minimize the risks of third-party scripts and plugins.

article thumbnail

Important KPIs for Successful Vendor Management

Reciprocity

Before outsourcing your business processes or striking some other deal with vendors, you do need to assess the risks they pose. After acceptable risk levels have been established, evaluate vendors’ security performance — and if a vendor’s cybersecurity is too lax for your tastes, require that vendor to make improvements as necessary.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Business Continuity Guide for Smaller Organizations

Stratogrid Advisory

Regardless of the industry (non-profit organizations, professional services companies, manufacturing, public sector, etc.), Contact information (Organizational chart ) - A responsibility of the Talent Management (HR) department (internal contacts), IT department (outsourced applications contacts) and vendor management department.

article thumbnail

Business Continuity Guide for Smaller Organizations

Stratogrid Advisory

Regardless of the industry (non-profit organizations, professional services companies, manufacturing, public sector, etc.), Contact information (Organizational chart ) - A responsibility of the Talent Management (HR) department (internal contacts), IT department (outsourced applications contacts) and vendor management department.