Skip to content

Priyanka Aash

Free 3rd Party Outsourcing Information Security Assessment Questionnaire

This free document is on 3rd party Outsourcing Information Security Assessment Questionnaire (Courtesy UBC IT). This questionnaire document has various information section on :  Company Information Policies, Standards and Procedures Architecture Configurations Product Design Compliance Access Controls Monitoring Physical Security Contingency Vendor’s Business Associates Download Document The document can be viewed below and downloaded from… Read More »Free 3rd Party Outsourcing Information Security Assessment Questionnaire

(Free) Third Party Risk Management Checklists And Frameworks From The Web

FireCompass content and research team has curated some top checklists and frameworks on third party risk management that were available on the web for free. You will find these frameworks and guidelines simple and ready to use. Free 3rdParty Outsourcing Information Security Assessment Questionnaire V1.4 This checklist has 2 parts to it with all segment wise… Read More »(Free) Third Party Risk Management Checklists And Frameworks From The Web

RDP:Remote, ‘Wormable’ Pre-Authentication Windows Vulnerability”

Microsoft has issued an warning that another ransomware outbreak similar to Wannacry can shut down the internet. There is a critical vulnerability (CVE-2019-0708) in its RDP/Remote Desktop Services that can be exploited remotely, via RDP, without authentication and can be used to run arbitrary code. An attacker could then install programs, view, change, or delete data; or create… Read More »RDP:Remote, ‘Wormable’ Pre-Authentication Windows Vulnerability”

Top 4 Risks That Can Be Mitigated Through Digital Footprint Monitoring

Top 4 Risks That Can Be Mitigated Through Digital Footprint Monitoring

Digital Footprint is the information about the organization that exists on the Internet as a result of their online activity. Organizations’ digital footprints are expanding and changing at a formidable rate. Employees, suppliers and other third-parties are exposing sensitive information without their knowledge. This sensitive data can leave organizations exposed and are used by attackers… Read More »Top 4 Risks That Can Be Mitigated Through Digital Footprint Monitoring

X