SURVEY: 1 IN 2 BUYERS REQUIRE CSR IN PROCUREM... » Almost half of buyer documents (48 per cent) seen by electrotechnical businesses with turnover above... G4S Africa supports small business development thr... » The latest product in the G4S Deposita range is a smart safe system called mini-pay that holds up to... Commissioner's statement following incident in Man... » This is an utterly appalling attack. My thoughts are with the people of Manchester as they try to co... UPDATE: Policing events in the Capital » Following the horrific terrorist attack in Manchester last night, in which 22 people were killed and... Statement from Assistant Commissioner » Statement from Assistant Commissioner Mark Rowley, Head of National Counter Terrorism Policing: The... Met intensifies policing activities in London fol... » The Metropolitan Police Service (MPS) has increased police numbers and operations across the Capital... OF FOOLS OF THE MIDDLE BELT, ONE NORTH AND PASTORA... » Please visit also: www.scorpionnewscorp.com SERIES: BUHARISM AND THE FIERCE URGENCY OF NOW A treat... Home Secretary’s statement on the Manchester attac... » I know that some people will only just be waking up to the news of the horrific attacks in Mancheste... Checkpoint Systems unveils Bug Tag 2 loss preventi... » Checkpoint Systems has announced the launch of Bug Tag 2 – an innovative loss prevention solution th... Edesix launches new head and torso mounted body wo... » Edesix has announced the launch of new head and torso mounted cameras. The X-100 is a side-mounta...

CLICK HERE TO

SOCIAL BOOKMARK

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Case Studies

Officials in ten states including Vermont, Arizona, Arkansas, Delaware, Idaho, Illinois, Kansas, Maine and Oklahoma have all reported a security breach which has accessed the information of the states' job seekers. The third party vendor, America’s Joblink Alliance, which operates the Joblink nationwide database has notified the states that the job seeker service had been compromised by malicious software.

While the full scope of the breach is not yet known, the AP says it's unknown whether social security numbers were breached, and that officials advise all system users to review bank, credit and debit accounts.

Experts with Prevalent, leaders in third-party risk management, comment on the massive breach:

Brad Keller, JD, CTPRP, Sr. Director 3rd Party Strategy, Prevalent, says "Certainly there is still much more to be revealed about the breach, but one thing is quickly reinforced – breaches may occur at vendors that a company has never identified pose a risk or which needs to be assessed. Companies need to take a broad look to determine all of the places outsourced risk could strike."

Jeff Hill, Director of Product Management, Prevalent comments: "One challenge we encounter when working with companies developing vendor risk management programs for the first time is the simple task of identifying all their vendors. On the surface, it sounds absurd, but modern organizations utilize myriad services that, at first glance, don’t conform to the conventional notion of a vendor. The Vermont Labor Department breach and other Joblink Alliance users highlight one example: a service embedded in the organization’s website. If we were to ask the vendor risk management team – assuming one exists – at the Vermont, Arkansas or Main agency to list their most critical vendors, it’s unlikely a JobLink would be top of mind. As these states' Departments of Labor learned the hard way, sometimes the riskiest vendors are the most obscure."