1. Request a copy of the vendor's cybersecurity policy
Businesses should request to review a copy of the vendor's cybersecurity policy before beginning a working relationship with them. This document should include details about the types of data they collect, how it is stored and protected, policies for employee access, security measures in place for data transfers, as well as what steps the vendor takes to comply with relevant regulations
2. Request a list of the types of data the vendor handles
The types of data that vendors handle will vary depending on their services and products, so it is essential to confirm which types they process. Businesses should ask for a list of all sensitive customer and company data that the vendor will be handling
3. Request a list of the security measures in place to protect data
Businesses should ask for detailed information about the security measures used by their vendors, including encryption protocols, authentication processes, and other technical safeguards. It should also include any physical security measures such as CCTV cameras or restricted access points
4. Review the vendor's online privacy policy
Vendors should have an up-to-date online privacy policy available on their website that outlines how customer data is collected, stored, and handled. Businesses should review this policy to ensure it meets their standards for protecting sensitive information
5. Check for third-party certifications and audits
Third-party certifications such as ISO 27001 and SOC 2 attest to the security measures employed by the vendor. Businesses should ask for proof of these certifications, as well as copies of any audit reports
6. Probe for information about how the vendor handles data breaches
Businesses should inquire about the procedures that their vendors have in place to detect, respond to, and mitigate data breaches. This includes details on what type of notification is provided in the event of a breach, how customers are alerted, and which third-parties are notified
7. Inquire about employee training on cyber security
It is important for businesses to ensure that their vendors' employees are trained on cybersecurity best practices. This includes comprehensive training on how to identify and respond to cyber threats, as well as any other relevant security measures
8. Ask about insurance coverage for data breaches
Businesses should inquire about the vendor's insurance coverage for data breaches. This will help them understand their financial exposure in the event of a breach, and provide information about who is responsible for covering costs associated with it
9. Request a sample contract clause related to cyber security liability
Vendors should include a clause in their contracts that outlines specific responsibilities regarding cybersecurity risks and liabilities. Businesses should review this clause to ensure they are adequately protected from potential losses due to negligence or malicious attacks by the vendor
10. Evaluate other factors such as customer base, size of company, and industry experience
When evaluating a vendor, businesses should take into account other factors such as the size of the company, customer base, and industry experience. This will help them determine if the vendor is best suited for their needs when it comes to cybersecurity. Additionally, businesses should also consider references from other customers to gain insight into how reliable they are in delivering on security requirements. Ultimately, these factors can provide valuable information that can be used to make an informed decision about working with the vendor
11. Check for compliance with relevant regulations (e.g., PCI DSS, HIPAA, GDPR)
Finally, businesses should confirm that their vendors are compliant with any relevant regulations related to data privacy and security. This includes confirming their compliance with standards such as the Payment Card Industry Data Security Standard (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA), and General Data Protection Regulation (GDPR). Asking for proof of compliance is essential to ensure that customer data is adequately protected