{"id":16019,"date":"2024-09-23T11:41:03","date_gmt":"2024-09-23T15:41:03","guid":{"rendered":"https:\/\/gtm.com\/business\/?p=16019"},"modified":"2024-10-24T14:57:08","modified_gmt":"2024-10-24T18:57:08","slug":"service-providers-cybersecurity-practices","status":"publish","type":"post","link":"https:\/\/gtm.com\/business\/service-providers-cybersecurity-practices\/","title":{"rendered":"6 Tips for Hiring Service Providers with Strong Cybersecurity Practices"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16023\" src=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/09\/pexels-cottonbro-5474288.jpg\" alt=\"service provider cybersecurity practices\" width=\"1024\" height=\"682\" srcset=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/09\/pexels-cottonbro-5474288.jpg 1024w, https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/09\/pexels-cottonbro-5474288-980x653.jpg 980w, https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/09\/pexels-cottonbro-5474288-480x320.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/p>\n<p>To help employers prudently select and monitor their service providers, the U.S. Department of Labor&#8217;s Employee Benefits Security Administration has prepared this publication regarding using service providers that follow strong cybersecurity practices.<\/p>\n<p>Employers often rely on service providers to maintain records, keep data confidential, and secure accounts. They should use service providers that follow strong cybersecurity practices.<\/p>\n<p><a href=\"https:\/\/gtm.com\/business\/why-gtm\/data-security\/\">Read about GTM&#8217;s commitment to data security<\/a>.<\/p>\n<p><strong>1.<\/strong> Ask about the service provider\u2019s information security standards, practices, policies, and audit results and compare them to the industry standards adopted by other institutions.<\/p>\n<ul>\n<li>Look for service providers that follow a recognized standard for information security and use an outside (third-party) auditor to review and validate cybersecurity. You can have much more confidence in the service provider if the security of its systems and practices are backed by annual audit reports that verify information security, system\/data availability, processing integrity, and data confidentiality.<\/li>\n<\/ul>\n<p><strong>2.<\/strong> Ask the service provider how it validates its practices and what levels of security standards it has met and implemented. Look for contract provisions that give you the right to review audit results demonstrating compliance with the standard.<\/p>\n<p><strong>3.<\/strong> Evaluate the service provider\u2019s track record in the industry, including public information regarding information security incidents, other litigation, and legal proceedings related to the vendor\u2019s services.<\/p>\n<p><strong>4.<\/strong> Ask whether the service provider has experienced past security breaches, what happened, and how the service provider responded.<\/p>\n<p><strong>5.<\/strong> Find out if the service provider has any insurance policies that would cover losses caused by cybersecurity and identity theft breaches (including breaches caused by internal threats, such as misconduct by the service provider\u2019s employees or contractors, and breaches caused by external threats, such as a third party hijacking a client&#8217;s account).<\/p>\n<p><strong>6.<\/strong> When you contract with a service provider, ensure that the contract requires ongoing compliance with cybersecurity and information security standards \u2013 and beware of contract provisions that limit the service provider\u2019s responsibility for IT security breaches. Also, try to include terms in the contract that would enhance cybersecurity protection, such as:<\/p>\n<h2>Information Security Reporting<\/h2>\n<p>The contract should require the service provider to annually obtain a third-party audit to determine compliance with information security policies and procedures.<\/p>\n<h3>Clear Provisions on the Use and Sharing of Information and Confidentiality<\/h3>\n<p>The contract should spell out the service provider\u2019s obligation to keep private information private, prevent the use or disclosure of confidential information without written permission, and meet a strong standard of care to protect confidential information against unauthorized access, loss, disclosure, modification, or misuse.<\/p>\n<h3>Notification of Cybersecurity Breaches<\/h3>\n<p>The contract should identify how quickly you would be notified of any cyber incident or data breach. It should also ensure the service provider\u2019s cooperation in investigating and reasonably addressing the cause of the breach.<\/p>\n<h3>Compliance with Records Retention and Destruction, Privacy and Information Security Laws<\/h3>\n<p>The contract should specify the service provider\u2019s obligations to comply with all applicable federal, state, and local laws, rules, regulations, directives, and other governmental requirements regarding the privacy, confidentiality, or security of participants\u2019 personal information.<\/p>\n<h3>Insurance<\/h3>\n<p>You may want to require insurance coverage such as professional liability and errors and omissions liability insurance, <a href=\"https:\/\/gtminsurance.com\/business-insurance\/cyber-data-breach-liability\/\" target=\"_blank\" rel=\"noopener\">cyber liability and privacy breach insurance<\/a>, and\/or fidelity bond\/blanket crime coverage. Be sure to understand the terms and limits of any coverage before relying upon it as protection from loss, including ensuring that the policy covers cybersecurity breaches and incidents involving the plan.<\/p>\n<p><em>Employee Benefits Security Administration<\/em><br \/>\n<em>UNITED STATES DEPARTMENT OF LABOR<\/em><\/p>\n<h2>GTM&#8217;s Cybersecurity Practices<\/h2>\n<p>Security is integral to our operations. It\u2019s at the core of what we do with multiple layers of protection embedded into our products, processes, and infrastructure.<\/p>\n<p>Our <a href=\"https:\/\/gtm.com\/business\/why-gtm\/data-security\/\">state-of-the-art security measures<\/a> are designed to safeguard your data from unauthorized access and cyber threats. We employ a robust combination of physical, administrative, and technical controls, including advanced encryption technologies, continuous network monitoring, and strict access controls, ensuring your data is protected around the clock.<\/p>\n<p>GTM undergoes annual security assessments from the New York State Department of Financial Services and adheres to the National Institute of Standards and Technology (NIST) for cybersecurity standards. GTM also submits to several third-party audits, including SOC 1 audits, Nacha audits, and financial statement audits.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. Department of Labor&#8217;s Employee Benefits Security Administration has prepared this publication regarding using service providers that follow strong cybersecurity practices.<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[232],"tags":[287,104,18,29],"post_folder":[],"class_list":["post-16019","post","type-post","status-publish","format-standard","hentry","category-gtm-biz-blog-isolved","tag-cybersecurity","tag-data-security","tag-employer-policies","tag-insurance"],"_links":{"self":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/posts\/16019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/comments?post=16019"}],"version-history":[{"count":5,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/posts\/16019\/revisions"}],"predecessor-version":[{"id":16028,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/posts\/16019\/revisions\/16028"}],"wp:attachment":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/media?parent=16019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/categories?post=16019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/tags?post=16019"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/post_folder?post=16019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}