Would you like a side order of lost data with your pizza? Your answer is most likely ‘no.’ Everyday, we put our trust with businesses. The trust is everything from signing up for a service online and giving over personal information to going to Domino’s Pizza and swiping your credit card to complete the order. Domino’s Australia has recently been blamed for a data breach that has leaked customer details.

Domino’s Pizza was fairly slow to the announcement game. Actually, the company was alerted to the breach by customer’s themselves once customer’s noticed that their names started to appear on online spam lists.

When confronted about the data breach, Domino’s Pizza’s statement apologizes for the spam, but further states that “there is no evidence to suggest that there has been any unauthorized access to Domino’s systems.”

Domino’s Pizza claims that their system had not been compromised; instead, the breach was blamed on a former third-party supplier that had been storing the information unsecurely.

Deeply upset, customer’s took to social media to voice their concerns and anger.

The reality, there’s still not enough conversation around the importance of recognizing that third-parties are just as important of a security risk as the widely talked about phishing scams and ransomware attacks. The risk to your personal and business data encompasses a larger playing field than most people understand.

This is why it’s imperative to involve your third-party vendors into your cyber security strategy. Third-parties are defined as external vendors or suppliers that have granted access to business systems. These individuals can be anybody including freelancers, contractors, and suppliers. Many might have access to important business data that’s not being monitored. When it’s not monitored properly, data breaches such as Domino’s Pizza happens. It’s time to end that ‘all-access’ pass to your valuable data and systems.

READ ALSO: How to Manage Third-Party Cyber Risks

Teramind offers a platform to monitor third-party vendors to ensure access is only granted to systems needed, decrease the chances of accidental mistakes that can damage system settings, and help improve IT safety measures. By setting-up an access account with vendor’s on Teramind, you can choose who you give clearance to your data. Further, you can track how vendors are using your data at any given time, and have a full live view and history playback.