Loading...

Secure Your Outsourcing Practices to Prevent Data Breaches

Published: April 15, 2013 by Guest Contributor

Outsourcing can be risky business. The Ponemon Institute reports that 65% of companies who outsourced work to a vendor have had adata breachinvolving consumer data and 64% say it has happened more than once. Their study,Securing Outsourced Consumer Data,sponsored byExperian® Data Breach Resolutionalso found that the most common cause for breaches were negligence and lost or stolen devices. Despite the gravity of these errors, only 38 percent of businesses asked their vendor to fix the problems that led to the breach and surprisingly, 56% of the companies learned about the data breach accidentally instead of through security protocols and control procedures.

These findings come from a survey of 748 people in a supervisory (or higher) job who work in vendor management at companies that share or transfer consumer data mainly for marketing, finance and outsourced IT operations including cloud services and payment processing. The survey also polled the vendors and 57% of them reported that they in turn, outsourced work to a third party. 23% of vendors could not tell how often data loss happened which is a sign that they don’t have proper procedures and policies in place to know when incidents occur. When asked about theirdata breach notificationpractices, only 16 percent of vendors said they immediately notified their client after the breach investigation with 25 percent saying they don’t even tell clients aboutbreaches of data.

Keeping all work and information in house is not feasible in today’s multi-corporate companies, and outsourcing is a business reality, however, all parties have a responsibility to protect the sensitive and confidential data that is entrusted to them. When outsourcing consumer data to vendors, here are a few guidelines companies need to follow to safeguard the information:

1. Make sure you hold vendors to the same security standards as your own in-house security policies and practices.

2. Make sure the vendor has appropriate security and controls procedures in place to monitor potential threats.

3. Audit the vendor’s security and privacy practices and make sure in your contract with them, the vendor is legally obligated to fix data problems should a breach occur including notifying consumers.

4. Monitor the security and privacy practices of vendors you work with especially if you share consumer data with them.

5. Require background checks for vendor employees who have access to confidential information.

The goal of this study was to better understand what companies are doing to protect consumer data they outsource and where improvements could be made to insure privacy and security when sharing private information with third parties. The solution seems to be that all parties must first agree thatdata privacy and protectionis paramount and then work toward the mutual goal of achieving responsible privacy and security practices.

Related Posts

Learn what lending fraud is, what you can do to safeguard your organization and consumers and how we can help. Read more!

Published: August 7, 2025 by Laura Burrows

Data breaches continue to be a reality for organizations across industries, and the complexity of responding to them is only increasing. From AI-driven fraud to third-party exposures, the risk landscape is shifting fast. Having a modern and tested response plan is essential to containing the damage, protecting your customers, and preserving your organization’s reputation when a breach occurs. Experian’s eleventh annual Data Breach Response Guide draws on decades of breach support experience. It offers practical strategies and insights for navigating the moments that matter most: the first hours after a breach and the days that follow. The 2025–2026 guide explores: How AI is shaping new breach and fraud patterns Where organizations are most vulnerable, including third-party and supply chain weak points Consumer expectations and how they influence crisis response How prepared organizations are reducing impact and protecting trust What is required to build a modern, effective breach response plan Organizations with a tested plan can potentially reduce the cost, impact, and long-term consequences of a breach. From real-world case insights to crisis communication templates, this guide is designed to help teams act quickly and confidently. Download the 2025–2026 Data Breach Response Guide to learn how you can strengthen your breach preparedness, reduce risk exposure, and build resilience against the next wave of cybersecurity threats. Download guide

Published: August 4, 2025 by Julie Lee

Experian is proud to be a Thought Leadership Sponsor at this year’s Federal Identity Forum & Expo. Meet us on site at FedID!

Published: August 1, 2025 by Kim Le