{"id":2893,"date":"2019-04-25T10:01:05","date_gmt":"2019-04-25T15:01:05","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=2893"},"modified":"2019-04-25T10:11:49","modified_gmt":"2019-04-25T15:11:49","slug":"key-questions-to-ask-your-vendors-about-their-cybersecurity-practices","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/","title":{"rendered":"Key Questions to Ask Your Vendors about their Cybersecurity Practices"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/04\/ServerSecurity.jpg\"><img decoding=\"async\" class=\"size-medium wp-image-2896 alignleft\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/04\/ServerSecurity-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/04\/ServerSecurity-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/04\/ServerSecurity-768x511.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/04\/ServerSecurity-1024x681.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Last month, the supply chain company Asus revealed hackers had broken into their servers and malicious code had been pushed out to its customers as part of a supposedly safe routine software update. <a href=\"https:\/\/usa.kaspersky.com\/blog\/shadow-hammer-teaser\/17396\/\" class=\"external external_icon\" rel=\"nofollow\">Kaspersky Labs<\/a>, who detected the attack, estimated 57,000 people received this update. This recent supply chain compromise is an example of how sophisticated and relentless hackers can be, even when protocols and firewalls are implemented to protect against such an event.<\/p>\n<h4><strong>How common are vendor related supply chain cybersecurity attacks?<\/strong><\/h4>\n<p>This incident is just one of many examples of vendors being susceptible to hackers and causing supply chain risk for their customers. According to the <a href=\"https:\/\/www.businesswire.com\/news\/home\/20181115005665\/en\/Opus-Ponemon-Institute-Announce-Results-2018-Third-Party\" class=\"external external_icon\" rel=\"nofollow\">Opus and Ponemon<\/a> study of more than 1,000 CISOs and other security and risk professionals across the United States and the United Kingdom, 59 percent of companies said they have experienced a data breach caused by one of their vendors or third parties. The percentage is even higher in the U.S. at 61 percent. What is even more surprising is that 22 percent of respondents admitted they didn\u2019t know they\u2019d had a third-party data breach in the past 12 months.<\/p>\n<p>Although your business has worked hard to effectively safeguard your own IT infrastructure, if your supply chain is not properly protected, outside vendors represent a disproportionate level of risk to your organization. Vendors and suppliers can have direct connections to your company\u2019s networks or systems, including ordering, billing, process management systems, and more. Knowing this, it\u2019s important to understand what precautions your vendors take to protect your information. Here are questions to ask your current and prospective vendors about safeguarding your data from cyber-attacks.<\/p>\n<h4><strong>Key Questions to Ask your Vendors<\/strong><\/h4>\n<p><strong>1. Does your organization have policies and procedures which clearly define how to prevent and detect security incidents should they happen? <\/strong><\/p>\n<p>The first step should be identifying if the vendor is taking active steps to prevent, detect, and contain security incidents when they happen. To prove this, they could provide the policies and procedures that they follow to keep your data safe. Ask about the details of their cybersecurity programs and methods that are used to prevent and detect security breaches.<\/p>\n<p><strong>2. Does your company have a dedicated security team? <\/strong><\/p>\n<p>Large vendors typically have dedicated cybersecurity teams and have complex security measures, but this might not be the case if it\u2019s a small company. Some companies cannot afford in-house security teams, so it\u2019s important to see if they have outsourced to a <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\">third-party vendor<\/a>. If they are using a third-party vendor, ask for details and references. Additionally, it\u2019s important to know your point of contact in the event of a cybersecurity breach to efficiently obtain updates and a course of action.<\/p>\n<p><strong>3. What security standards and\/or frameworks do you follow? <\/strong><\/p>\n<p>There are multiple standards companies must adhere to depending on their industry. Some examples are HIPAA, GDPR, PCI, SOX, and DFARs. Depending on the type of service they are providing, the vendor may have to follow similar standards as your company. For example, HIPAA compliance contains standards that must be applied to safeguard and protect electronic Protected Health Information (ePHI) when it is at rest and in transit. These rules apply to anybody or any system that has access to this information. If the vendor is dealing with ePHI they will also need to make sure they are meeting the technical, physical and administrative safeguards that come with HIPAA compliance. For non-regulated industries, it\u2019s still important to understand if the vendor has a systematic approach to security, and what framework they are using, such as NIST, CIS, or ISO, to name a few. Ask the vendor what risk framework they adhere to. Finally, don\u2019t be afraid to ask for proof or documentation of their ongoing security endeavors as they relate to this framework.<\/p>\n<p><strong>4. Do you have security\/cyber liability insurance? <\/strong><\/p>\n<p>According to <a href=\"https:\/\/www.statista.com\/topics\/2445\/cyber-insurance\/\" class=\"external external_icon\" rel=\"nofollow\">Statista<\/a>, The estimated value of cyber insurance premiums worldwide in 2020 could be 7.5 billion.<\/p>\n<p>Having <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-businesses-need-cyber-liability-insurance\/\">cyber liability insurance<\/a> shows the vendor is taking a proactive approach to security and safeguarding your information. This type of insurance covers property losses and liability that might occur when an organization participates in tech-facilitated activities, such as collecting data or selling things online. The coverage typically includes but is not limited to liability for a data breach in which sensitive information gets exposed or stolen by cybercriminals.<\/p>\n<p>Cyber liability insurance can cover expenses related to the following:<\/p>\n<ul>\n<li>Data recovery<br \/>\n\u2022 Helping clients remedy personal identity theft<br \/>\n\u2022\u00a0\u00a0\u00a0 Notifying customers about the breach<br \/>\n\u2022\u00a0\u00a0\u00a0 Repairing damaged computer systems<br \/>\n\u2022\u00a0\u00a0\u00a0 Legal fees and expenses<\/li>\n<\/ul>\n<p><strong>5. Do you regularly perform vulnerability tests and\/or security monitoring? <\/strong><\/p>\n<p>Companies should perform security testing to identify vulnerabilities within their systems. At the very least, the company should perform an automated scan to help protect the simplest forms of attack which would alert them of any weaknesses. A deeper review, such as a penetration test, can also be done to demonstrate how potential attackers can exploit weaknesses within specific systems, apps, websites or devices.<\/p>\n<p><strong>6. What security development and testing do your teams receive? <\/strong><\/p>\n<p>In addition to testing its systems, the company could also invest in training its employees to protect their own environments. Security awareness training not only informs and educates employees about the best IT security practices but also carries out in-house phishing attacks to test their knowledge.<\/p>\n<p><strong>7. Where are you storing my data? <\/strong><\/p>\n<p>You should have a general idea of the security controls in your vendor\u2019s environment and you should insist that they include control around isolation and protection.<\/p>\n<p><strong>8. Is data encrypted, including data that is backed up? <\/strong><\/p>\n<p>Encryption is the best way to protect data, especially when storing and transferring data. Backups are also an important element to ask about. You might want to understand how often, where backups are stored and the security that is taken to protect it.<\/p>\n<p><strong>9. Do you have a business continuity and disaster recovery plan in place? <\/strong><\/p>\n<p>Comparable to cyber liability insurance, a <a href=\"https:\/\/www.stratospherenetworks.com\/backup-and-disaster-recovery.html\">backup continuity and disaster recovery plan<\/a> shows how prepared a company is in the event of a cyber-attack or a disaster. An active information security team can make a huge difference when it comes to sharing relevant threat data and detailing exact plans to minimize financial loss. Being vigilant pays off, the <a href=\"https:\/\/securityintelligence.com\/ponemon-cost-of-a-data-breach-2018\/\" class=\"external external_icon\" rel=\"nofollow\">Poneman Institute<\/a> found an incident response team can reduce the cost of a breach by as much as $14 per compromised record from the average per-capita cost of $148.<\/p>\n<p>A third-party data breach could come at a high cost for your business that could have short-term and long-term impacts. Don\u2019t wait until it\u2019s too late to protect your company. Our IT security experts are available to assist you and meet your business\u2019s need to achieve the highest possible level of cybersecurity protection. Contact us today by calling (877) 598-3999 or emailing <a href=\"mailto:sales@convergedsystems.com\">sales@convergedsystems.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last month, the supply chain company Asus revealed hackers had broken into their servers and malicious code had been pushed out to its customers as part of a supposedly safe routine software update. Kaspersky Labs, who detected the attack, estimated &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[263],"tags":[270,272,273,271],"class_list":["post-2893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-corner","tag-cybersecurity","tag-supply-chain","tag-third-party-vendors","tag-vendors"],"yoast_head":"<title>Key Questions to Ask Your Vendors about their Cybersecurity Practices - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support<\/title>\n<meta name=\"description\" content=\"Ask these questions to understand what precautions your current and prospective vendors take to safeguard your information from a cybersecurity attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Questions to Ask Your Vendors about their Cybersecurity Practices - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"og:description\" content=\"Ask these questions to understand what precautions your current and prospective vendors take to safeguard your information from a cybersecurity attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-25T15:01:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-25T15:11:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"Key Questions to Ask Your Vendors about their Cybersecurity Practices\",\"datePublished\":\"2019-04-25T15:01:05+00:00\",\"dateModified\":\"2019-04-25T15:11:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/\"},\"wordCount\":1143,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"keywords\":[\"Cybersecurity\",\"supply chain\",\"third-party vendors\",\"vendors\"],\"articleSection\":[\"Cyber Corner\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/\",\"name\":\"Key Questions to Ask Your Vendors about their Cybersecurity Practices - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2019-04-25T15:01:05+00:00\",\"dateModified\":\"2019-04-25T15:11:49+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"Ask these questions to understand what precautions your current and prospective vendors take to safeguard your information from a cybersecurity attack.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Key Questions to Ask Your Vendors about their Cybersecurity Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"Key Questions to Ask Your Vendors about their Cybersecurity Practices - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"Ask these questions to understand what precautions your current and prospective vendors take to safeguard your information from a cybersecurity attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/","og_locale":"en_US","og_type":"article","og_title":"Key Questions to Ask Your Vendors about their Cybersecurity Practices - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","og_description":"Ask these questions to understand what precautions your current and prospective vendors take to safeguard your information from a cybersecurity attack.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2019-04-25T15:01:05+00:00","article_modified_time":"2019-04-25T15:11:49+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"Key Questions to Ask Your Vendors about their Cybersecurity Practices","datePublished":"2019-04-25T15:01:05+00:00","dateModified":"2019-04-25T15:11:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/"},"wordCount":1143,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","keywords":["Cybersecurity","supply chain","third-party vendors","vendors"],"articleSection":["Cyber Corner"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/","name":"Key Questions to Ask Your Vendors about their Cybersecurity Practices - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2019-04-25T15:01:05+00:00","dateModified":"2019-04-25T15:11:49+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"Ask these questions to understand what precautions your current and prospective vendors take to safeguard your information from a cybersecurity attack.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-questions-to-ask-your-vendors-about-their-cybersecurity-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Key Questions to Ask Your Vendors about their Cybersecurity Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2893"}],"version-history":[{"count":9,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2893\/revisions"}],"predecessor-version":[{"id":2903,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2893\/revisions\/2903"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}