Employee Security Training
Common Cyber Security Attacks

Table of Contents
Join thousands of professionals and get the latest insight on Compliance & Cybersecurity.
Cybersecurity attacks happen in a variety of ways. Most of these happen through systems that you use regularly.
These include SQL Injection, MITM, and DDoS. We will cover these attack vectors in the below sections:
- Ensure your company has a policy for Third Party Risk Management (TPRM) with clearly defined controls that apply to TPRs.
- Maintain a central repository for TPRs and analyze the cybersecurity risks they pose and subsequently, apply appropriate controls to each party, with reference to TPRM or best practices you are familiar with.
- Third parties are not just ‘vendors’. Any supplier, IT service provider, associate, affiliate, or consultant is also part of the same set of third-party relationships. Controls in your organization’s information security policies should apply to all.
- Apply controls across the relationship. The importance of cybersecurity controls is normally overlooked, especially during and in the terminal phases of the relationship.
- Require your third parties to inform you of their security practices and in particular, any breaches, especially in relation to data concerning your customers or organization.
When cyber attacks occur in your supply chain of TPRs and if the data compromised concerns your business or its customers, your organization is likely to suffer impact too and may even be held liable.
As a result, watch out for the parties you are interacting with within the course of business and be mindful of cyber risk in this sphere.
Find out how we can assist you in completing your compliance journey.