Skip to content
AICPA-CIMA
  • AICPA & CIMA:
  • Home
  • CPE & Learning
  • My Account
Journal of Accountancy
  • TECH & AI
    • All articles
    • Artificial Intelligence (AI)
    • Microsoft Excel
    • Information Security & Privacy

    Latest Stories

    • IRS IT overhaul set to finish by 2028, former official says
    • Shaping AI governance and controls
    • Simple but effective AI use cases for CAS
  • TAX
    • All articles
    • Corporations
    • Employee benefits
    • Individuals
    • IRS procedure

    Latest Stories

    • Prop. regs. amend Sec. 3406 backup withholding regulations
    • IRS IT overhaul set to finish by 2028, former official says
    • IRS to start accepting and processing tax returns on Jan. 26
  • PRACTICE MANAGEMENT
    • All articles
    • Diversity, equity & inclusion
    • Human capital
    • Firm operations
    • Practice growth & client service

    Latest Stories

    • Stablecoin reporting: AICPA’s updated criteria includes controls
    • 5 imperatives for auditors from the PCAOB chair
    • Prop. regs. amend Sec. 3406 backup withholding regulations
  • FINANCIAL REPORTING
    • All articles
    • FASB reporting
    • IFRS
    • Private company reporting
    • SEC compliance and reporting

    Latest Stories

    • SEC proposes amendments to small entity definitions
    • Key signals from the SEC-PCAOB conference point to a busy new year
    • New SEC chair to CPAs: ‘Back to basics’
  • AUDIT
    • All articles
    • Attestation
    • Audit
    • Compilation and review
    • Peer review
    • Quality Management

    Latest Stories

    • 5 imperatives for auditors from the PCAOB chair
    • Key signals from the SEC-PCAOB conference point to a busy new year
    • Audit transformation road map: New report lays out the journey
  • MANAGEMENT ACCOUNTING
    • All articles
    • Business planning
    • Human resources
    • Risk management
    • Strategy

    Latest Stories

    • How a CPA beat burnout after strokes, years of depression
    • Overall economic view slides, but CPAs feel better about their companies
    • As Finance Duties Shift, CAOs Take On Strategic Role
  • Home
  • News
  • Magazine
  • Podcast
  • Topics
Advertisement
  1. newsletter
  2. Cpa Insider
CPA INSIDER

How to mitigate vendor risk in a cybersecurity environment

Here’s what CPAs need to know when vetting vendors’ security practices.

By Lisa Traina, CPA/CITP, CGMA
September 7, 2015

Please note: This item is from our archives and was published in 2015. It is provided for historical reference. The content may be out of date and links may no longer function.

Related

June 1, 2015

Experts warn of cybersecurity ‘storm’: Technology round table, part 2

April 16, 2015

CPAs select security as top technology priority

TOPICS

  • Technology
    • IT Governance, Risk & Controls

Organizations seeking to protect sensitive data from cybercriminals must worry about more than their own operations when assessing potential threats. Vendors represent one of the highest risk areas in an organization’s cybersecurity structure.

Did you know that many major data breaches—including those at Goodwill, Home Depot, Lowe’s, and Target—started with vendor security issues? Or that AT&T was fined $25 million earlier this year due to compromised customer information resulting from lax security at a few of its call center vendors?

A recent incident reminded me just how significant the security risk with vendors can be. I was helping a friend with some accounting issues, and we needed to access a server at her office remotely. When she told me her remote-access password was “password1,” that was scary. What was even scarier was realizing that a vendor—in this case, a small computer network support company—set up the remote access. If we can’t trust the hired computer help to be concerned with security, whom can we trust?

We recently began offering vendor review services because many of our clients were struggling in this area. Initially, we underestimated two things: the amount of time required to complete a thorough review and the number of issues that would be identified. The need for due diligence is quite real!

Performing a thorough “vendor due diligence” is critical not only when selecting a vendor, but also on an ongoing basis. This is true for third parties that host your data as well as those that have regular access to your data, including computer support vendors. You are paying for services, so you should demand security that meets or exceeds your own security standards.

Prior to beginning your due diligence, you may want to identify all vendors that have access to your personally identifiable data and what data is visible to each vendor. You may then vet vendors with a full review process or other steps, including paying them a visit and asking for a full tour of their facilities and a complete explanation of their operational and security policies. This research will complement any written documentation you may already have in hand.

Areas for reviewing vendors

Advertisement

Due diligence should begin with the contract. Never commit to a vendor unless the contract satisfactorily addresses crucial points including service-level agreements (SLAs), breach notification, and right to audit, among other factors. All contracts should start with a nondisclosure agreement. In addition, every contract or agreement should specifically address data security; you cannot assume that appropriate security controls are in place. This is particularly true for cloud applications. In addition to the contract, other areas should be investigated. Vendor reviews should focus on the following:

  1. IT security controls: All vendors should report on the key security measures they employ, and, in fact, many publish white papers explaining their security standards. Minimum security controls that should be in place for hosted data include:
    • Strong password parameters requiring complex passwords that expire periodically and strong controls limiting administrative privileges for vendors and ensuring that vendors do not share administrative passwords and privileges;
    • Invalid login lockout settings—e.g., three strikes and you’re out;
    • Multifactor authentication to prevent logins from new systems, unidentified devices, etc.
    • Encryption of data in transmission and at rest. It is worth noting that encryption at rest is sometimes an optional feature;
    • Limits on which resources vendors are authorized to access;
    • Establishment of an audit trail to identify who, by name, accessed the systems and which data, if any, they could see and/or change.
    In addition to controls, the vendor should absolutely undergo some form of information technology audit. This may be an AICPA Service Organization Controls (SOC) report but for smaller vendors, it could be an alternate assessment providing assurances of adequate security. If you cannot obtain any security audit information, you should be concerned. In addition to a security assessment, you want to know how often the vendor conducts employee training.
  2. Financial condition: It usually is not difficult to access company financial data on large vendors—and that information definitely is worth reviewing. Vendors in poor financial condition often are more likely to take shortcuts that can compromise security. Sometimes, the vendor will have to discontinue services, leaving customers in the lurch. Smaller, privately held vendors usually don’t have to make financial information available, but you can question them about their growth rates, length of time in business, etc.
  3. Business continuity: While data security is paramount, data availability also is essential. Data is not worth much if you and/or your clients can’t access it. Vendors should have sufficient plans for backup data centers and telecommunications lines to ensure a seamless business continuity plan.
  4. Incident response: Because breaches are now considered inevitable, all organizations should have plans for dealing with one. There should be complete transparency, with all contracts including provisions for timely notification of an incident. Incident response involves the monitoring and detection of security events on a computer network and the execution of appropriate responses to those events. This issue is large enough that banking regulators recently published new guidelines pertaining to incident response, business continuity, and vendor capacity.
  5. Other issues: Vendor reviews also should examine insurance coverage, performance standards, SLAs, and compliance reporting. Vendors often do not readily provide assurance of compliance with critical standards and regulations, such as the Gramm-Leach-Bliley Act and Sarbanes-Oxley. You should demand to see those reports.

Big questions that should be answered

Your vendor reviews are not complete until you can answer the following basic, but important, questions:

  1. Did you review the correct vendor(s)? Multiple vendors may be involved with any given system because software providers typically outsource hosting functions to data center providers such as Amazon Web Services (AWS). The security information you receive is more than likely for the data center, not the company you are contracting with. You should be able to get assurances from both parties, but this is often not the case. If you cannot obtain security assurances from the primary vendor, you should be concerned.
  2. Does this vendor review the security of other vendors it uses? Every vendor will be using other vendors, and they should have due diligence procedures of their own. This is not a given. AT&T admitted that its procedures for vetting subcontractors needed improvement.
  3. Where is your data stored? This might seem simple and obvious, but it isn’t always easy to determine where your data resides. This is because vendors have multiple data centers as well as multiple backup locations. You need to know if your data is in foreign countries.
  4. Does the vendor have periodic vulnerability testing? Because exploited vulnerabilities cause so many of today’s breaches, it is important that every organization undergo periodic testing. This is not a given either. In addition to testing, the timely remediation of vulnerabilities is needed. It may require some digging to know that a good process exists at your vendor and the related data center.

Most organizations do not have sufficient vendor review procedures in place, but it is never too late to start the process. And the process should be ongoing, occurring at least annually. Here’s hoping that the tips above will help you ensure that the third parties you use don’t increase your cybersecurity risks.

Lisa Traina, CPA/CITP, CGMA, is the founder and owner of Traina & Associates, which provides information systems and IT security audit and consulting services to business clients.

Advertisement

latest news

January 12, 2026

Stablecoin reporting: AICPA’s updated criteria includes controls

January 12, 2026

5 imperatives for auditors from the PCAOB chair

January 9, 2026

Prop. regs. amend Sec. 3406 backup withholding regulations

January 9, 2026

SEC proposes amendments to small entity definitions

January 9, 2026

IRS IT overhaul set to finish by 2028, former official says

Advertisement

Most Read

IRS clarifies health savings account changes in H.R. 1 in new notice
IRS to start accepting and processing tax returns on Jan. 26
Corporate Transparency Act, source of BOI reporting mandate, held constitutional
Tax provisions in the One Big Beautiful Bill Act
Business standard mileage rate increases for 2026
Advertisement

Podcast

January 8, 2026

Getting unstuck by rethinking processes, people, and AI

December 17, 2025

Are CPA firms ready for the next wave of data security threats?

December 11, 2025

Why 2026 is another ‘big tax year’

Features

Get ready for tax season

Get ready for tax season

Filing season quick guide — tax year 2025

Filing season quick guide — tax year 2025

How a CPA beat burnout after strokes, years of depression

How a CPA beat burnout after strokes, years of depression

Tax-efficient drawdown strategies in retirement

Tax-efficient drawdown strategies in retirement

Simple but effective AI use cases for CAS

Simple but effective AI use cases for CAS

Shaping AI governance and controls

Shaping AI governance and controls

FROM THIS MONTH'S ISSUE

How a CPA beat burnout after strokes, depression

Randy Crabtree, CPA, suffered two strokes in four days and struggled with his mental health for years before he learned to recognize, address, and prevent chronic stress. Learn from his insights on how CPAs can avoid professional burnout.

From The Tax Adviser

December 31, 2025

Practical tax advice for businesses as a result of the OBBBA

November 30, 2025

How a CPA and wealth adviser partnership can guide families through transition

November 30, 2025

Digital asset transactions: Broker reporting, amount realized, and basis

October 31, 2025

Recent developments in estate planning

MAGAZINE

January 2026

January 2026

December 2025

December 2025

November 2025

November 2025

October 2025

October 2025

September 2025

September 2025

August 2025

August 2025

July 2025

July 2025

June 2025

June 2025

May 2025

May 2025

April 2025

April 2025

March 2025

March 2025

February 2025

February 2025

view all

View All

PUSH NOTIFICATIONS

Learn about important news

This quick guide walks you through the process of enabling and troubleshooting push notifications from the JofA on your computer or phone.

CPA LETTER DAILY EMAIL

Subscribe to the daily CPA Letter

Stay on top of the biggest news affecting the profession every business day. Follow this link to your marketing preferences on aicpa-cima.com to subscribe. If you don't already have an aicpa-cima.com account, create one for free and then navigate to your marketing preferences.

Connect

  • JofA on X
  • JofA on Facebook

HOME

  • News
  • Monthly issues
  • Podcast
  • A&A Focus
  • PFP Digest
  • Academic Update
  • Topics
  • RSS feed
  • Site map

ABOUT

  • Contact us
  • Advertise
  • Submit an article
  • Editorial calendar
  • Privacy policy
  • Terms & conditions

SUBSCRIBE

  • Academic Update
  • CPE Express

AICPA & CIMA SITES

  • AICPA-CIMA.com
  • Global Engagement Center
  • Financial Management (FM)
  • The Tax Adviser
  • AICPA Insights
  • Global Career Hub
AICPA & CIMA

© 2026 Association of International Certified Professional Accountants. All rights reserved.

Reliable. Resourceful. Respected.