T: +370 (5) 2487361
F: +370 (5) 2487362
E: info@synergy.lt

Nadruvos str. 24, LT-06228
Vilnius, Lithuania

Service Desk Login

unnamed file


A Weak Link in an Organization’s Cyber Security Program?

Vendor-related IT security is a well-documented concern within the cyber security industry. In exploring the main cyber security challenges with third-party vendors, a recent Mandiant report highlights several issues associated with attacks stemming from IT outsourcing (ITO).

According to the report, a compromised ITO service provider can enable an attacker to shortcut the Targeted Attack Lifecycle and execute an advanced attack. When an attacker infiltrates a targeted company’s network using the compromised ITO infrastructure, they have essentially skipped the first three phases of the lifecycle including the need to craft an exploit, like a spear phishing email.
Read more: cyberark.com