{"id":72372,"date":"2023-09-22T17:40:55","date_gmt":"2023-09-22T09:40:55","guid":{"rendered":"https:\/\/version-2.com\/?p=72372"},"modified":"2023-09-14T17:43:42","modified_gmt":"2023-09-14T09:43:42","slug":"navigating-the-complexities-of-third-party-remote-access","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/09\/navigating-the-complexities-of-third-party-remote-access\/","title":{"rendered":"Navigating the complexities of third-party remote access"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"72372\" class=\"elementor elementor-72372\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f466523 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f466523\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[],&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-a2bda0a\" data-id=\"a2bda0a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5LErCgqW3BRBchDxKfqflx\/f6cce13d6ae52511d47b435aa025da1d\/Navigating_the_Complexities_of_Third-party_Remote_Access_web_cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"473\" \/><\/p><div class=\"Grid_item__8Wd1v Grid_col8Md__zJ2a8\"><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">No modern digital business is totally independent.<b> <\/b>Cloud computing and ever-changing IT technology force organizations to rely on third parties. And <b>most digital companies cannot exist without a community of trusted partners<\/b>.\u00a0<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Companies look to third-party vendors when sourcing the latest applications and infrastructure. Third-party service providers support cloud deployments. External partners cut administration costs. And they even secure company networks. However, <b>third-party remote access <\/b>brings <b>problems as well as benefits.<\/b><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Partners need to access your corporate network. And external access brings security risks. Companies can control how their employees use network assets. Yet, enforcing the same standards for workers at third parties is not easy.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This article will explain how to secure third-party access<b>.<\/b> We will explore how businesses can create secure platforms with robust access controls. And we will help you navigate the design process to ensure seamless and safe third-party relationships.<\/p><h2 id=\"what-is-thirdparty-remote-access\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">What is third-party remote access?<\/h2><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Third-party remote access enables<b> secure remote access for users not directly employed by the network owner<\/b>. Third-party network users come in various forms.<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Third-party%20remote%20access%20enables%20secure%20remote%20access%20for%20users%20not%20directly%20employed%20by%20the%20network%20owner.%20Third-party%20network%20users%20come%20in%20various%20forms.&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcomplexities-of-third-party-remote-access\" target=\"_blank\" rel=\"noopener\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Contractors<\/b> provide specific services on a contractual basis. Companies bring in contractors as needed to maintain systems, audit security controls, or fill gaps in their workforce. These individuals may work on-site. But they could also be remote contractors.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Vendors<\/b> supply companies with applications needed to create professional environments. They sell cloud infrastructure and storage space. And they provide hardware to engineer physical networks. Vendors are almost always based off-site and may have minimal contact with clients. But they often need network access to provide services.<\/p><\/li><\/ul><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Securing third-party connections requires <b>comprehensive risk management strategies<\/b>. Companies should never allow unrestricted network access for vendors or service providers, regardless of how trusted they are.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Third parties dramatically increase the attack surface<\/b> of corporate networks. For example, risks associated with external partners include:<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Insider threats<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Employees at third-party organizations may use legitimate credentials to breach networks. They can steal confidential data, implant malware, or compromise system integrity.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Malware attacks<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Any remote connection can become a gateway for a ransomware attack. Companies must monitor every access request and ensure that firewalls cover third parties.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">System failure<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Companies rely on third parties to support everyday operations. When these services fail, they can compromise client networks.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Regulatory risks<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Regulations include strict rules about using third-party providers. A data breach due to poor third-party security can lead to regulatory penalties and reputational damage.<\/p><p><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6B9EquojCqdePDvOQG8V9Z\/11af97c5a41545b8838f76161ac44126\/How_to_secure_your_assets_with_network_access_control_1400x730.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"432\" \/><\/p><h2 id=\"the-growing-need-for-external-network-access\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">The growing need for external network access<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Third parties are a crucial part of the modern business landscape. Few organizations own and operate their network infrastructure. Even fewer develop apps in-house. Using third parties is a business necessity. Cloud service providers are filling that need.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Companies worldwide depend on cloud hosting for data storage and employee collaboration. The public cloud computing market has<a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/www.statista.com\/statistics\/273818\/global-revenue-generated-with-cloud-computing-since-2009\/\" target=\"_blank\" rel=\"noopener\"> expanded rapidly<\/a> from $145 billion in 2017 to almost $600 billion in 2023. And there are plenty of reasons for this shift.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Cloud services<b> make managing workflows cheaper and leaner<\/b>. Third parties allow companies to switch from legacy apps to flexible cloud tools hosted off-site. Local data centers are unnecessary. Maintenance costs fall as companies become less reliant on physical network infrastructure.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Digital transformations also <b>enable companies to serve their customers more efficiently<\/b>. For example, merchants use third-party technology to create seamless digital purchasing systems. Or they may use a 3D modeling vendor to deliver augmented reality experiences.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The rush to cloud-hosted services is impossible without remote access for third parties. <b>External partners routinely access client assets<\/b> to support corporate accounting. Or they might deliver customized eCommerce APIs.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This reliance is not unusual. However, without robust security solutions, third parties represent a data breach risk. Securing access for third parties is a critical security challenge.<\/p><h2 id=\"risk-management-in-vendor-network-entry\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Risk management in vendor network entry<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Organizations need solid strategies to handle third-party risks. Companies managing remote access for third-parties risks must focus on <b>hazard control and mitigating threats<\/b>.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Hazard control<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Security teams <b>identify the risks linked to each vendor. <\/b>A typical example is data breaches caused by insider attacks. Risk assessors might identify a risk of credential theft due to poor security practices. Alternatively they might decide that third-party API risks like code injection are more significant.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The consequences of third-party services failing is another critical example. Not every vendor poses an operational risk. However, security planners must identify relevant operational risks.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Threat mitigation<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">After identifying and classifying risks, security teams <b>apply controls or policies to mitigate those risks<\/b>. Controls must manage third-party access efficiently. They should also protect data against bad actors. Finding the right balance is challenging.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Companies must create and test incident recovery strategies. Recovery plans should mitigate operational risks from third-party failures. Auditing processes constantly test vendor security. Audits identify new risks before they compromise network security.<\/p><h2 id=\"secure-your-infrastructure-the-role-of-network-access-control\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Secure your infrastructure: the role of network access control<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Access control is the most crucial risk mitigation system when handling third-party hazards. <b>Access controls lock down the network edge<\/b>. They filter third-party access requests. And they <b>enforce authentication and authorization policies.<\/b><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Properly designed access control systems <b>allow third parties enough access to carry out core duties.<\/b> However, they <b>limit network access beyond the assets required to carry out those duties<\/b>.<\/p><p data-testid=\"text\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5zmSMkazSWnLfnLk2f4y4Z\/cb156a7ceb932906f0b2ab6114cd257f\/How_to_secure_your_assets_with_network_access_control_1400x658.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"389\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Access controls vary depending on the organization involved and the type of third party. But they tend to have similar core components. These components include:<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Entry regulation or authentication<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Authentication systems demand a third-party vendor&#8217;s credentials for each access request. For instance, <b>multi-factor authentication (MFA) <\/b>demands more than one unique identifier for each user. Authentication combines with firewalls and allowlisting. These tools filter unknown users, adding another defensive line to the network edge.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Permission management<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Access management systems assign each third-party vendor the permissions needed to execute their duties. Users cannot access network assets outside the scope of the access policy. Tightly defined privileges limit east-west movement inside the network.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Authorization control<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Controls track vendor activity. They determine whether third parties can access network objects. Systems collect data about user access requests and the activities of every third-party vendor. This data is stored in a standardized format, enabling access during management audits.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The three components listed above work in combination. They assess third parties before allowing access. Security systems screen malicious threats and block cyber-attacks at the network edge.<\/p><h2 id=\"how-can-you-ensure-secure-network-access-for-third-parties\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">How can you ensure secure network access for third parties?<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Organizations need to work with third parties. There is no alternative in a cloud-dominated business landscape. The question is how to create secure network access for every vendor.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The answer lies in a mixture of security technologies and administrative measures. On the security side, essential controls include:<\/p><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>IP address allowlisting <\/b>\u2014 enforces <b>lists of approved identities<\/b>. Filters check IP information when users make connection requests. Users can create grouped filters for approved vendors. You can easily add new contractors and automate the removal of third parties when vendor partnerships end.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Network Access Control (NAC) <\/b>\u2013 NAC <b>enforces security policies to admit or exclude network users<\/b>. Controls check device health and user location. And they can check IP address data and user credentials. Network segmentation also falls under NAC. Users who comply with pre-set conditions can access the network environment.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/identity-access-management\/\"><b>Identity and Access Management<\/b><\/a><b> (IAM)<\/b> \u2013 Access management systems <b>grant users role-based privileges.<\/b> Security teams can define resources available for each identity. They can use filters to block all other network assets. When third-party security breaches occur, intruders will have limited scope to access data and apps.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Access Keys<\/b> &#8211; These tools allow safe access to cloud platforms like Amazon Web Services. When partners log on, they use a unique access key. <b>Network managers do not need to share their AWS or Google credentials<\/b>. This reduces the chance of allowing unauthorized access to general network assets.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Data Loss Prevention (DLP) <\/b>\u2013 DLP <b>protects sensitive data against unauthorized third-party access.<\/b> DLP enforces data security policies. It tracks data movements and prevents data extraction without appropriate credentials.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Firewalls<\/b> \u2013 Firewalls <b>filter incoming and outgoing traffic.<\/b> They work alongside IP allowlisting, preventing unauthorized access. You can segment data environments and apply cloud-native firewalls around financial or customer information.<\/p><\/li><\/ul><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Organizations must also implement <b>administrative safeguards<\/b> to handle third-party risks.<\/p><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Vendor risk assessments<\/b> &#8211; Companies should carry out risk assessments before commissioning third-party services. IT teams should <b>check the compliance record of potential partners<\/b>. They should verify that third parties take security seriously.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Contract management &#8211; <\/b>Contracts should include <b>clauses related to cybersecurity and data protection<\/b>. Agreements should state the security responsibilities of the third party. Companies should <b>monitor contracts constantly<\/b> to detect any policy breaches.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Security policy management &#8211; <\/b>Security policies should cover third-party access risks. Comprehensive policies should guide the behavior of third parties. Regularly audit these policies to ensure their effectiveness.<\/p><\/li><\/ul><h2 id=\"best-practices-for-3rd-party-access-control\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Best practices for 3rd party access control<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Companies must secure every third-party connection. If not, data breaches and regulatory penalties will result. However, securing third-party access is complex. And organizations routinely work with hundreds of external partners. So, <b>simplifying the security challenge is critical<\/b>.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">With the correct steps, you can control access safely. And you can do so without compromising the efficiency of vendor-supplied solutions. These best practices will help you achieve complete security.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">1. Implement strict access controls<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Treat all third-party connections as a potential risk. Assess what resources the third-party needs to carry out their role. Only allow access to those resources. Use Access Management solutions, firewalls, and allowlisting to block everything else.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">2. Risk assess all vendors and contractors<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Carry out a risk assessment before installing third-party tools or onboarding contractors. Determine how third parties could compromise data and applications. Put in place risk control measures to mitigate those risks.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">3. Create secure zones with network segmentation<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Some third-party solutions create significant risks but still have a business benefit. In these cases, it makes sense to use network segmentation.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Segmentation creates safe zones guarded by cloud firewalls and access controls. Safe zones act like a containment strategy, protecting the rest of the network.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">4. Proactively monitor third-party connections<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Continuously monitor third-party connections to detect suspicious behavior or potential cyber-attacks. Use threat detection tools to detect malware or unusual access patterns. But don&#8217;t avoid being reactive. Employ proactive NAC tools that block third parties that fail to meet security conditions.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">5. Write clear security policies for vendors and internal staff<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Provide all third parties with security policies during the onboarding process. Policies should explain the partner\u2019s security responsibilities and penalties for policy breaches. They should detail user permissions and access requirements. They should also document data protection rules.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Security policies should also cover internal employees. Explain how to access third-party network assets securely. And provide training to reinforce safe data handling processes.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">6. Provide secure connection tools<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Provide secure VPN access for third parties. VPNs encrypt connections and anonymize IP addresses. Secure gateways operate access policies for each third party. Encrypted tunnels separate third-party traffic from the wider internet. Business network managers can control each remote connection.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">7. Audit third-party access to ensure security<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Regularly audit third-party access. Audits should check that access controls are functioning as designed. Check that third-party privileges are appropriate and that segmentation protects critical data. And routinely check for third-party suppliers that have escaped security controls.<\/p><h2 id=\"conclusion-make-thirdparty-access-secure-and-smooth\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Conclusion: make third-party access secure and smooth<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Working with third parties is an unavoidable aspect of modern business. Reliance on third parties is never risk-free. But secure vendor onboarding is always possible. You just need the right tools and security expertise.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer&#8217;s access solutions can secure every third-party vendor relationship.<\/p><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/blog\/ip-whitelisting-for-cloud-security\/\"><b>IP Allowlisting<\/b><\/a> admits trusted identities and excludes unknown users.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/network-access-control\/\"><b>NAC<\/b><\/a><b> tools<\/b> assess users at the network edge. Only approved devices and identities can enter the network perimeter.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Secure gateways<\/b> create encrypted tunnels for remote third-party connections.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/features\/network-segmentation\/\"><b>Network segmentation<\/b><\/a><b> systems<\/b> implement role-based permissions. Authorized partners can access the resources they need. But everything else remains out of their scope.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Enhanced identity verification<\/b> allows to check a user\u2019s identity with identity management features like MFA and biometrics.<\/p><\/li><\/ul><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Securing third-party access can be confusing. But NordLayer&#8217;s secure access controls help you neutralize critical risks.<a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/contact-sales\/\"> Get in touch<\/a> with the NordLayer team today. We&#8217;ll find a solution that works for you and your external partners.<\/p><\/article><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21818f9 elementor-widget elementor-widget-video\" data-id=\"21818f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=u-C6riv85nc&amp;embeds_referring_origin=https%3A%2F%2Fnordsecurity.com&amp;source_ve_path=MjM4NTE&amp;feature=emb_title&amp;ab_channel=NordSecurity-creatingasafecyberfuture&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb34594 elementor-widget elementor-widget-text-editor\" data-id=\"eb34594\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"Article_wrapper__YyQ2_\"><p class=\"text-base leading-normal\">In this episode, we dive into:\u00a0<\/p><ul class=\"list-disc ml-24\"><li class=\"ml-20\"><div><p class=\"text-base leading-normal\">ChatGPT\u2019s evil twin WormGPT<\/p><\/div><\/li><li class=\"ml-20\"><div><p class=\"text-base leading-normal\">The Federal Trade Commission (FTC) investigation into OpenAI data leak and ChatGPT\u2019s inaccuracy<\/p><\/div><\/li><li class=\"ml-20\"><div><p class=\"text-base leading-normal\">A new 4-day rule for disclosing cyberattacks set by the US Securities and Exchange Commission (SEC)<\/p><\/div><\/li><\/ul><p><a class=\"inline-block px-24 text-center text-micro leading-normal uppercase outline-none focus:outline-none duration-250 ease-out rounded-small focus:bg-blue-400 text-white rounded-md normal-case font-regular py-10 px-26 bg-black-solid hover:bg-blue-600\" style=\"border-radius: 12px;\" href=\"https:\/\/www.youtube.com\/watch?v=u-C6riv85nc\">Watch Cyberview here\u00a0<\/a><\/p><h2 id=\"ChatGPT's evil twin WormGPT\" class=\"text-h2 leading-none text-left\"><b>ChatGPT&#8217;s evil twin WormGPT<\/b><\/h2><p class=\"text-base leading-normal\">The new tool, WormGPT, is advertised on underground forums as a blackhat alternative to ChatGPT for launching <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/thehackernews.com\/2023\/07\/wormgpt-new-ai-tool-allows.html\" target=\"_blank\" rel=\"noopener noreferrer\">phishing and business email compromise (BEC) attacks<\/a>. Although, ChatGPT\u2019s natural language abilities can already help hackers write convincing emails, resulting in the obvious signs of malicious emails disappearing.<\/p><p class=\"text-base leading-normal\">Tools like ChatGPT and Google\u2019s Bard have some safeguards in place that try to ensure that AI-generated content does not cause harm. However, <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.independent.co.uk\/tech\/chatgpt-dark-web-wormgpt-hack-b2376627.html\" target=\"_blank\" rel=\"noopener noreferrer\">WormGPT is specifically designed to be fully unrestricted and facilitate criminal activities<\/a>, so it raises even more questions about the ethical limits of AI.<\/p><h2 id=\"FTC investigates OpenAI over data leak and ChatGPT\u2019s inaccuracy\" class=\"text-h2 leading-none text-left\"><b>FTC investigates OpenAI over data leak and ChatGPT\u2019s inaccuracy<\/b><\/h2><p class=\"text-base leading-normal\">Has ChatGPT broken consumer protection laws by <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.washingtonpost.com\/technology\/2023\/07\/13\/ftc-openai-chatgpt-sam-altman-lina-khan\/\" target=\"_blank\" rel=\"noopener noreferrer\">risking personal reputations and data<\/a>? The FTC has opened an investigation into OpenAI, requiring details on how OpenAI gathers and protects data and vets information.<\/p><p class=\"text-base leading-normal\">The FTC wants to know how information was used to train its model and how it prevents false claims from being shown to users. Additionally, they are interested in how APIs connect to OpenAI\u2019s systems and how user data is protected, all while the <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"\/en\/blog\/FTC%20issued%20multiple%20warnings\/\" target=\"_blank\" rel=\"noopener noreferrer\">FTC issued multiple warnings<\/a> that existing consumer protection laws apply to AI.<\/p><h2 id=\"The 4-day deadline for public companies to report breaches\" class=\"text-h2 leading-none text-left\"><b>The 4-day deadline for public companies to report breaches <\/b><\/h2><p class=\"text-base leading-normal\">US companies hit by cyberattacks will face a 4-day deadline for publicly disclosing hacks, under new rules approved by the US Securities and Exchange Commission (SEC). There are mixed feelings about this new requirement. On the one hand, it is praised for <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/news.bloomberglaw.com\/privacy-and-data-security\/companies-have-4-day-deadline-to-report-hacks-in-final-sec-rule\" target=\"_blank\" rel=\"noopener noreferrer\">encouraging transparency<\/a> about cybersecurity breaches, as they are considered as important to investors as any other significant operational disruption.<\/p><p class=\"text-base leading-normal\">On the other hand, the new rule is being labeled as a controversially short deadline that may not allow companies enough time to put an action plan in place or fix vulnerabilities. Although regulations state that if the SEC is informed in writing of a national security or public safety risk, a delay in breach disclosure of up to 60 days is allowed.<\/p><p class=\"text-base leading-normal\"><b>Stay tuned for the next episode of Cyberview.<\/b><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>No modern digital business is totally independent. Clou [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1075,1130,61],"tags":[974,1076,1132],"class_list":["post-72372","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-year2023","category-nordlayer","category-press-release","tag-nord-security","tag-1076","tag-nordlayer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Navigating the complexities of third-party remote access - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/complexities-of-third-party-remote-access\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating the complexities of third-party remote access - Version 2\" \/>\n<meta property=\"og:description\" content=\"No modern digital business is totally independent. Clou [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/complexities-of-third-party-remote-access\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-22T09:40:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5LErCgqW3BRBchDxKfqflx\/f6cce13d6ae52511d47b435aa025da1d\/Navigating_the_Complexities_of_Third-party_Remote_Access_web_cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/complexities-of-third-party-remote-access\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/09\\\/navigating-the-complexities-of-third-party-remote-access\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Navigating the complexities of third-party remote access\",\"datePublished\":\"2023-09-22T09:40:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/09\\\/navigating-the-complexities-of-third-party-remote-access\\\/\"},\"wordCount\":2432,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/complexities-of-third-party-remote-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5LErCgqW3BRBchDxKfqflx\\\/f6cce13d6ae52511d47b435aa025da1d\\\/Navigating_the_Complexities_of_Third-party_Remote_Access_web_cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"2023\",\"NordLayer\"],\"articleSection\":[\"Nord Security\",\"2023\",\"NordLayer\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/complexities-of-third-party-remote-access\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/09\\\/navigating-the-complexities-of-third-party-remote-access\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/complexities-of-third-party-remote-access\\\/\",\"name\":\"Navigating the complexities of third-party remote access - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/complexities-of-third-party-remote-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/complexities-of-third-party-remote-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5LErCgqW3BRBchDxKfqflx\\\/f6cce13d6ae52511d47b435aa025da1d\\\/Navigating_the_Complexities_of_Third-party_Remote_Access_web_cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"datePublished\":\"2023-09-22T09:40:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/complexities-of-third-party-remote-access\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/complexities-of-third-party-remote-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/complexities-of-third-party-remote-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5LErCgqW3BRBchDxKfqflx\\\/f6cce13d6ae52511d47b435aa025da1d\\\/Navigating_the_Complexities_of_Third-party_Remote_Access_web_cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5LErCgqW3BRBchDxKfqflx\\\/f6cce13d6ae52511d47b435aa025da1d\\\/Navigating_the_Complexities_of_Third-party_Remote_Access_web_cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/complexities-of-third-party-remote-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating the complexities of third-party remote access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Navigating the complexities of third-party remote access - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/complexities-of-third-party-remote-access\/","og_locale":"en_US","og_type":"article","og_title":"Navigating the complexities of third-party remote access - Version 2","og_description":"No modern digital business is totally independent. Clou [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/complexities-of-third-party-remote-access\/","og_site_name":"Version 2","article_published_time":"2023-09-22T09:40:55+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/5LErCgqW3BRBchDxKfqflx\/f6cce13d6ae52511d47b435aa025da1d\/Navigating_the_Complexities_of_Third-party_Remote_Access_web_cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/complexities-of-third-party-remote-access\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/09\/navigating-the-complexities-of-third-party-remote-access\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Navigating the complexities of third-party remote access","datePublished":"2023-09-22T09:40:55+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/09\/navigating-the-complexities-of-third-party-remote-access\/"},"wordCount":2432,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/complexities-of-third-party-remote-access\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5LErCgqW3BRBchDxKfqflx\/f6cce13d6ae52511d47b435aa025da1d\/Navigating_the_Complexities_of_Third-party_Remote_Access_web_cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","keywords":["Nord Security","2023","NordLayer"],"articleSection":["Nord Security","2023","NordLayer","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nordlayer.com\/blog\/complexities-of-third-party-remote-access\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/09\/navigating-the-complexities-of-third-party-remote-access\/","url":"https:\/\/nordlayer.com\/blog\/complexities-of-third-party-remote-access\/","name":"Navigating the complexities of third-party remote access - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/complexities-of-third-party-remote-access\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/complexities-of-third-party-remote-access\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5LErCgqW3BRBchDxKfqflx\/f6cce13d6ae52511d47b435aa025da1d\/Navigating_the_Complexities_of_Third-party_Remote_Access_web_cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","datePublished":"2023-09-22T09:40:55+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/complexities-of-third-party-remote-access\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/complexities-of-third-party-remote-access\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/complexities-of-third-party-remote-access\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/5LErCgqW3BRBchDxKfqflx\/f6cce13d6ae52511d47b435aa025da1d\/Navigating_the_Complexities_of_Third-party_Remote_Access_web_cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5LErCgqW3BRBchDxKfqflx\/f6cce13d6ae52511d47b435aa025da1d\/Navigating_the_Complexities_of_Third-party_Remote_Access_web_cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/complexities-of-third-party-remote-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Navigating the complexities of third-party remote access"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-iPi","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/72372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=72372"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/72372\/revisions"}],"predecessor-version":[{"id":72376,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/72372\/revisions\/72376"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=72372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=72372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=72372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}