1 min reading
Wed Nov 24 2021

Volkswagen suffered a data breach through a third party

volkswagen-suffered-a-data-breach-through-a-third-party

"A data breach at a Volkswagen vendor has impacted millions of customers and prospective car purchasers across North America.

The breach occurred after information gathered by the vendor between 2014 and 2019 for sales and marketing purposes was stored electronically in an unsecured file for years."

Source and full article; VW Vendor Leaves Data Unsecured - Infosecurity Magazine (infosecurity-magazine.com)

At Ceeyu, we have implemented a SaaS platform that can help assess the security of your vendors and other third parties through easy-to-use self-assessment questionnaires. By implementing this in your third-party risk management process, you can easily and quickly identify areas of risk and start working with risky vendors to up their game and increase their security posture, effectively increasing yours as well.

Contact us for a demo! [email protected]
 

Jimmy pommerenke Ceeyu

Jimmy Pommerenke

Author

Jimmy is the founder, CEO and CTO of Ceeyu. Prior to founding Ceeyu, Jimmy was responsible for cybersecurity programs at large financial institutions and consulting company EY. Jimmy started his career as a security engineer. His duties included installing and managing firewalls, scanning infrastructure for vulnerabilities, and performing pen testing and ethical hacking.

Other Blogposts

assessing-the-risks-of-your-third-parties-part-1-an-introduction

Assessing the risks of your third parties, part 1: an introduction.

Managing the risks of working with third parties go far beyond some shared assets on your digital footprint.

October 26, 2021

Pen testing or attack surface management

Attack Surface Management or Penetration testing, which one do I need?

Both penetration testing and attack surface management solutions are proactive cybersecurity measures that give customers visibility into ri...

March 29, 2023

Ceeyu UI

Managing supply chain risks: what are the key risk assessment criteria?

Supply chain attacks are escalating, and regulations like NIS2 and DORA now mandate robust risk management. This post outlines key assessmen...

January 22, 2025