| 
 
 
Third-Party Risks in the Digital World:  
Do You Know Who Else Is Coming to the Party? 
 
Today’s retail world is increasingly interconnected, and e-commerce customers 
expect to shop in the digital marketplace with minimal friction. Third-party 
systems are a critical component of this experience and comprise a greater and 
greater share of customers’ interactions with our organizations. They process 
payments, remember preferences, showcase and deliver goods and services; they 
streamline the customer’s purchasing experience. The vendor and third-party 
system relationship brings significant benefits to customers and retail 
organizations. It can also pose some very real governance and security dangers 
with domains and code being dropped in without any approval or awareness. 
Today’s business leaders need to fully understand what is being added to their 
digital properties and by whom. Diving deeper into this analysis will help 
companies mitigate the risk while getting the most out of the third-party 
partners who should be there. 
 
Current state 
 
From social media to payment processing systems, third-party systems are 
supporting more and more business operations. In their work in this area,
The Media Trust found that 
20 years ago, 90 percent of the code on company websites was owned and operated 
in-house. Today that number has flipped: an average of 90% of website code comes 
from third- (or fourth-, or fifth-) parties. 
 
This increased integration brings a host of benefits. Customers’ shopping 
experiences are enhanced by familiar settings, faster checkouts and the ease of 
saved payment preferences. Retail organization’s use of third-party applications 
means there is less code to maintain and troubleshoot, which minimizes the 
stress on internal IT resources. 
  
Yet, the benefits of third-party integration may come with some drawbacks. One 
key concern is having awareness of the extent of “nth-party” integrations on 
shopping pages. In some cases, third-party integrations may bring in other 
parties of their own. And, whereas companies may have vetted the original 
third-party, they may not even be aware of additional nth-parties on those 
pages. 
 
If a breach occurs – even if the fault lies with a third party – the customer 
will remember the brand associated with the transaction, not the cause. People 
remember British Airways and Equifax, not the third-party that brought the 
malicious code into the site. 
 
The loss of customer data is just one danger posed by third-party breaches. They 
also bring along the addition of cookies, which, in this day and age of GDPR and 
CCPA, bring a whole host of additional risks. 
 
It is possible to significantly minimize exposure and mitigate the potential 
damage. A mix of proactive governance and policy decisions and the application 
of security and digital e-commerce best practices can ensure that your 
organization is on firm footing in dealing with your third-party vendors. 
 
Setting up to succeed 
 
Establishing solid governance and policy around security – particularly 
cybersecurity – is a necessary step for any organization operating today. 
Assessing your third-party risk position is a critical part of this. But 
assessing third-party risk as it relates to your digital presence is not easy. 
Ask yourself: 
	- 
	
What 
	third parties have access to your e-commerce sites, i.e. client-side 
	execution?  
	- 
	
Who 
	else might have access through those third-parties?  
	- 
	
What 
	level of digital risk is an acceptable tradeoff for the benefits delivered 
	by third parties?  
	- 
	
What 
	standards must third-party vendors meet, and what digital asset guidelines 
	must you enforce to ensure those standards are met?  
	- 
	
What 
	best practices are peers in your and related industries applying to better 
	manage risk and how might you capture, comprehend and apply their insights? 
	 
	- 
	
How 
	often are you checking your logs to see if other domains have been dropped 
	onto your site?  
 
It is critical that organizations active in 
e-commerce remain aware of every nth-party integration within their digital 
environment. This is an obvious step, but given the complex relationships 
between major third-party vendors, it can at times be difficult to identify all 
the entities that participate in your customers’ interactions with you. 
 
Identifying and vetting third-party vendors and ensuring that they meet your 
standards is an important first step but your diligence must not stop there. 
Follow the old adage: “trust, but verify.” Your organization should continually 
monitor all web and mobile app code, both in-house and third-party, involved in 
client-side execution. Conducting vulnerability scanning of this client-side 
code is not only a basic element in any security program but also is often a 
requirement for compliance with government and industry standards. 
 
Conclusion 
 
Third-party vendors can pose risks to modern e-commerce environments. Evaluation 
and management of risks allow organizations to maximize the benefits of 
third-party integrations in e-commerce with eyes wide open to the potential 
risks. It’s up to business AND security leaders to understand this balance of 
risk vs. benefit, and to incorporate the steps necessary to ensure that 
appropriate digital security best practices are in place. In so doing, you can 
offer customers the best of all worlds: the benefits of an efficient digital 
transactional experience and the protections of best practice security and 
governance. 
  Article originally published on 
cpomagazine.com 
   |