Carry out information and cyber security risk assessments and due diligence checks to understand and mitigate risks prior to granting IT suppliers access to your organisation's networks and assets.
Options to consider:
- Complete risk assessments prior to procuring services.
- Conduct due diligence checks.
- Group suppliers into different categories based on the nature of the service they provide.
- Assign risk profiles to each group, taking into account the:
- sensitivity of the personal information processed;
- capability of likely threats; and
- impact on operations of any loss, damage or disruption.