{"id":356,"date":"2018-03-22T09:58:14","date_gmt":"2018-03-22T09:58:14","guid":{"rendered":"https:\/\/www.emmera.be\/mra\/?page_id=356"},"modified":"2018-08-27T08:40:52","modified_gmt":"2018-08-27T08:40:52","slug":"third-party-security-and-risk-assessment","status":"publish","type":"page","link":"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/","title":{"rendered":"Third Party Security And Risk Assessment"},"content":{"rendered":"<h2>Security Assessment<\/h2>\n<p>Your company most likely does business with many partners, suppliers, and other third parties.\u00a0 You may have little visibility on how well they are securing themselves, or what they might be doing with the valuable data you are entrusting in them. It is time to make a TPSA (Third Party Security Assessment)<\/p>\n<p>Before you entrust sensitive data to any third party, your company needs to be sure the partner can and will keep it safe from attack.<\/p>\n<p>Such assessments are important, not only to prevent the accidental leaking of sensitive customer data, but also to prevent more deliberate attacks where hackers might exploit inadequate security measures at \u201ctrusted\u201d parties in order to tunnel into businesses.<\/p>\n<p>Should your partner be hacked, if he handles your data, It will be your name that will appear in the press.<\/p>\n<figure id=\"attachment_354\" aria-describedby=\"caption-attachment-354\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-354 size-medium\" src=\"https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2018\/03\/risk-assessment-2-300x124.jpg\" alt=\"Third Party Security Assessment (TPSA)\" width=\"300\" height=\"124\" srcset=\"https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2018\/03\/risk-assessment-2-300x124.jpg 300w, https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2018\/03\/risk-assessment-2.jpg 487w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-354\" class=\"wp-caption-text\">Security Risk Assessment<\/figcaption><\/figure>\n<p>Moreover, with the <a href=\"https:\/\/www.emmera.be\/mra\/index.php\/privacy-data-protection\/\" target=\"_blank\" rel=\"noopener\">GDPR<\/a> coming into force, companies are now obliged to verify the security and the privacy capabilities of their suppliers or partners.<\/p>\n<h2>Third Party Security Assessment &#8211; TPSA<\/h2>\n<p>When should you require a partner\/supplier to go through a Security Assessment ?<\/p>\n<p>\u2022 When connecting to your IT network<\/p>\n<p>\u2022 When handling (private) data for you<\/p>\n<p>\u2022 When developing software or IT solutions, or creating and maintaining a website for you, certainly if this website or software handle private data or e-commerce<\/p>\n<p>\u2022 You send data (from your company or your customers) to a supplier<\/p>\n<p>\u2022 \u2026<\/p>\n<p>Not every company is going to care as much about security and privacy as your business. Take care when choosing your partners, because at the end of the day your customers don\u2019t really care that much about whether it was you or a third-party which was careless with their data. What they care about is that they entrusted their data with you.<\/p>\n<p>We propose different types of Security Assessment, but we will always adapt them to your needs. We also can design a custom made security assessment exactly for your need.<\/p>\n<p>Don\u2019t wait to<a href=\"https:\/\/www.emmera.be\/mra\/index.php\/contact\/\" target=\"_blank\" rel=\"noopener\"> contact Us<\/a> for more information and \/ or a quotation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Assessment Your company most likely does business with many partners, suppliers, and other third parties.\u00a0 You may have little visibility on how well they are securing themselves, or what they might be doing with the valuable data you are entrusting in them. It is time to make a TPSA (Third Party Security Assessment) Before &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Third Party Security And Risk Assessment&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-356","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Third Party Security And Risk Assessment - EMMERA<\/title>\n<meta name=\"description\" content=\"Before you entrust sensitive data to any third party, your company needs to be sure the partner can and will keep it safe from attack. Making a neutral and independant Security Assessment is your best solution.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Third Party Security And Risk Assessment - EMMERA\" \/>\n<meta property=\"og:description\" content=\"Before you entrust sensitive data to any third party, your company needs to be sure the partner can and will keep it safe from attack. Making a neutral and independant Security Assessment is your best solution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"EMMERA\" \/>\n<meta property=\"article:modified_time\" content=\"2018-08-27T08:40:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2018\/03\/risk-assessment-2-300x124.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/\",\"url\":\"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/\",\"name\":\"Third Party Security And Risk Assessment - EMMERA\",\"isPartOf\":{\"@id\":\"https:\/\/www.emmera.be\/mra\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2018\/03\/risk-assessment-2-300x124.jpg\",\"datePublished\":\"2018-03-22T09:58:14+00:00\",\"dateModified\":\"2018-08-27T08:40:52+00:00\",\"description\":\"Before you entrust sensitive data to any third party, your company needs to be sure the partner can and will keep it safe from attack. Making a neutral and independant Security Assessment is your best solution.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/#primaryimage\",\"url\":\"https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2018\/03\/risk-assessment-2.jpg\",\"contentUrl\":\"https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2018\/03\/risk-assessment-2.jpg\",\"width\":487,\"height\":201},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.emmera.be\/mra\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Third Party Security And Risk Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.emmera.be\/mra\/#website\",\"url\":\"https:\/\/www.emmera.be\/mra\/\",\"name\":\"EMMERA\",\"description\":\"Security Risk Data Protection\",\"publisher\":{\"@id\":\"https:\/\/www.emmera.be\/mra\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.emmera.be\/mra\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.emmera.be\/mra\/#organization\",\"name\":\"Emmera\",\"url\":\"https:\/\/www.emmera.be\/mra\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.emmera.be\/mra\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2017\/09\/Emmera.png\",\"contentUrl\":\"https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2017\/09\/Emmera.png\",\"width\":361,\"height\":127,\"caption\":\"Emmera\"},\"image\":{\"@id\":\"https:\/\/www.emmera.be\/mra\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Third Party Security And Risk Assessment - EMMERA","description":"Before you entrust sensitive data to any third party, your company needs to be sure the partner can and will keep it safe from attack. Making a neutral and independant Security Assessment is your best solution.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/","og_locale":"en_GB","og_type":"article","og_title":"Third Party Security And Risk Assessment - EMMERA","og_description":"Before you entrust sensitive data to any third party, your company needs to be sure the partner can and will keep it safe from attack. Making a neutral and independant Security Assessment is your best solution.","og_url":"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/","og_site_name":"EMMERA","article_modified_time":"2018-08-27T08:40:52+00:00","og_image":[{"url":"https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2018\/03\/risk-assessment-2-300x124.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/","url":"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/","name":"Third Party Security And Risk Assessment - EMMERA","isPartOf":{"@id":"https:\/\/www.emmera.be\/mra\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/#primaryimage"},"image":{"@id":"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2018\/03\/risk-assessment-2-300x124.jpg","datePublished":"2018-03-22T09:58:14+00:00","dateModified":"2018-08-27T08:40:52+00:00","description":"Before you entrust sensitive data to any third party, your company needs to be sure the partner can and will keep it safe from attack. Making a neutral and independant Security Assessment is your best solution.","breadcrumb":{"@id":"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/#primaryimage","url":"https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2018\/03\/risk-assessment-2.jpg","contentUrl":"https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2018\/03\/risk-assessment-2.jpg","width":487,"height":201},{"@type":"BreadcrumbList","@id":"https:\/\/www.emmera.be\/mra\/index.php\/third-party-security-and-risk-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.emmera.be\/mra\/"},{"@type":"ListItem","position":2,"name":"Third Party Security And Risk Assessment"}]},{"@type":"WebSite","@id":"https:\/\/www.emmera.be\/mra\/#website","url":"https:\/\/www.emmera.be\/mra\/","name":"EMMERA","description":"Security Risk Data Protection","publisher":{"@id":"https:\/\/www.emmera.be\/mra\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.emmera.be\/mra\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.emmera.be\/mra\/#organization","name":"Emmera","url":"https:\/\/www.emmera.be\/mra\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.emmera.be\/mra\/#\/schema\/logo\/image\/","url":"https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2017\/09\/Emmera.png","contentUrl":"https:\/\/www.emmera.be\/mra\/wp-content\/uploads\/2017\/09\/Emmera.png","width":361,"height":127,"caption":"Emmera"},"image":{"@id":"https:\/\/www.emmera.be\/mra\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P9bOTr-5K","_links":{"self":[{"href":"https:\/\/www.emmera.be\/mra\/index.php\/wp-json\/wp\/v2\/pages\/356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.emmera.be\/mra\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.emmera.be\/mra\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.emmera.be\/mra\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.emmera.be\/mra\/index.php\/wp-json\/wp\/v2\/comments?post=356"}],"version-history":[{"count":7,"href":"https:\/\/www.emmera.be\/mra\/index.php\/wp-json\/wp\/v2\/pages\/356\/revisions"}],"predecessor-version":[{"id":520,"href":"https:\/\/www.emmera.be\/mra\/index.php\/wp-json\/wp\/v2\/pages\/356\/revisions\/520"}],"wp:attachment":[{"href":"https:\/\/www.emmera.be\/mra\/index.php\/wp-json\/wp\/v2\/media?parent=356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}