Third-party breaches are a wake-up call for modern cybersecurity
The era of interconnected risk demands collaboration and vigilance

Cybersecurity has never been more critical than in today’s hyper-connected world, where businesses increasingly rely on third-party vendors to deliver essential services.
Yet, recent reports, including Verizon’s 2025 Data Breach Investigations Report (DBIR), reveals a troubling trend: almost a third of cyber breaches now involve third-party vendors or external platforms.
This is not merely an IT challenge; it is a call to reshape how we perceive and address cybersecurity risks in the modern era.
Distinguished Security Architect at Verizon Business Group.
The growing prevalence of third-party breaches raises questions of accountability, transparency, and the very nature of digital trust.
As a cybersecurity professional, this issue is not only a technical challenge but as an opportunity to rethink our approach to safeguarding information.
The data is stark, the risks are clear, and the solutions—though within reach—require a collective shift in mindset.
The expanding risk landscape
Third-party vendors have become indispensable to the success of modern businesses.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
From software-as-a-service (SaaS) platforms to cloud storage providers, these entities enable organizations to operate efficiently, scale rapidly, and innovate constantly.
Yet, this dependency comes at a cost: an expanded attack surface that malicious actors are prepared to exploit. The 2025 DBIR highlights alarming trends that cannot be ignored.
Attacks targeting virtual private networks (VPNs) and edge devices have surged nearly eightfold, and leaked credentials on platforms like GitHub can remain active for an average of 94 days.
This is more than just a statistic—it is a glaring vulnerability that underscores the interconnected nature of digital ecosystems.
Simply put, the systems enabling modern operations are also opening doors to cybercriminals, often faster than organizations can close them.
Why firewalls are no longer enough
The traditional firewall, once the cornerstone of cybersecurity, is proving increasingly inadequate in the era of third-party risks.
While firewalls remain essential, their effectiveness diminishes when faced with the complexities of the modern digital landscape.
The integration of cloud services, Internet of Things (IoT) devices, and remote management capabilities has fundamentally altered how businesses must defend themselves.
IoT devices, in particular, present a unique challenge. Continuously connected to the internet, they offer potential access points not only to authorized administrators but also to global threat actors.
The question for cybersecurity leaders is no longer whether to deploy firewalls or VPNs—it is how to adapt these tools to a reality where third-party involvement is unavoidable and inherently risky.
Practical steps for mitigation
Replacing third-party providers may seem like an appealing solution, but it is often impractical. Vendors are deeply integrated into business processes, making their removal both challenging and disruptive.
Instead, organizations must focus on mitigation strategies tailored to specific third-party relationships. Here are some actionable recommendations:
- Vendors in your software supply chain: Prioritize vulnerability management and network segmentation. For edge devices, limiting exposure to the open internet can significantly reduce risks, especially when patching is delayed
- Vendors hosting your data: Evaluate their security and operational resilience through risk questionnaires and Third-Party Cyber Risk Management (TPCRM) solutions. These tools provide quantifiable insights into internal security measures.
- Vendors connecting to your network: Enforce comprehensive network segmentation, stringent authentication policies, password complexity, API key aging, and multi-factor authentication (MFA). These measures should exceed those applied internally to employees.
These practices are essential, but let’s be honest—they are not a complete solution. The interconnected nature of networks means that no single organization can achieve true security on its own. Collaboration is not just a buzzword; it is a necessity.
From accountability to transparency
Holding vendors accountable for their cybersecurity practices is a critical first step, but it is not the whole solution. Organizations must cultivate an environment of transparency and information sharing, paving the way for structured frameworks for threat modeling.
Collaborative efforts between companies and their third-party partners are vital to making informed decisions that protect data and, ultimately, the customers who entrust businesses with their information.
Transparency in third-party relationships can transform cybersecurity from a reactive discipline to a proactive strategy. It is about creating a culture where risks are openly discussed, shared, and mitigated collectively.
A collective responsibility
We are at a crossroads. The challenges posed by third-party breaches are not isolated incidents; they are shared vulnerabilities that demand collective action. Cybersecurity leaders must embrace transparency, collaboration, and advanced mitigation strategies, redefining security in a connected world—not as an unattainable ideal, but as a shared responsibility.
If we fail to act, the consequences will be severe—not just for businesses but for the broader digital ecosystem we all rely on. The time to address third-party breaches is now. The stakes are higher than ever, but the solutions lie within our grasp.
What’s needed is not just innovation but unity—a commitment to safeguarding the interconnected world we have built together.
We've featured the best encryption software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Vincent Goh is a Distinguished Security Architect at Verizon Business Group.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.