Agree & Join LinkedIn

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Articles
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
Last updated on Feb 5, 2025
  1. All
  2. Engineering
  3. Network Security

Your network security is at risk from third-party software. How do you fix it without causing chaos?

Protecting your network from third-party software vulnerabilities requires a strategic approach that minimizes disruption. Here's how to secure your system:

  • Conduct thorough assessments: Regularly evaluate third-party software for potential security risks.

  • Implement strict access controls: Limit software permissions to necessary functions only.

  • Stay updated: Ensure all third-party software is consistently updated to patch known vulnerabilities.

How do you handle third-party software security? Share your thoughts.

Network Security Network Security

Network Security

+ Follow
Last updated on Feb 5, 2025
  1. All
  2. Engineering
  3. Network Security

Your network security is at risk from third-party software. How do you fix it without causing chaos?

Protecting your network from third-party software vulnerabilities requires a strategic approach that minimizes disruption. Here's how to secure your system:

  • Conduct thorough assessments: Regularly evaluate third-party software for potential security risks.

  • Implement strict access controls: Limit software permissions to necessary functions only.

  • Stay updated: Ensure all third-party software is consistently updated to patch known vulnerabilities.

How do you handle third-party software security? Share your thoughts.

Add your perspective
Help others by sharing more (125 characters min.)
59 answers
  • Contributor profile photo
    Contributor profile photo
    Santosh Kumar FIP, CISSP, PMP, CISA, CHFI, AIGP

    Cybersecurity & Data Protection Leader | CISO & DPO | GenAI Architect | Fellow of Information Privacy (FIP) 🏫 IIT Madras| IIM Indore

    • Report contribution

    "A chain is only as strong as its weakest link." 🎯 Zero-Trust Execution – Run third-party software in isolated environments like sandboxing or containerization. 🎯 Real-Time Threat Intelligence – Leverage AI-driven monitoring to detect anomalies in third-party applications. 🎯 Contractual Security Clauses – Mandate vendors to follow strict security guidelines with SLAs for patching. 🎯 Behavior-Based Whitelisting – Allow only pre-approved, verified software actions to minimize risk. 🎯 Kill Switch Mechanism – Implement a rapid shutdown feature to disable compromised software instantly.

    Like
    9
  • Contributor profile photo
    Contributor profile photo
    Tom Le

    Unconventional Security Thinking | Follow me. It’s cheaper than therapy and twice as amusing.

    • Report contribution

    This question is overly broad and exemplifies the excessive use of AI-generated content in LLMs. A proper answer requires more context, including the nature of the third-party risks, your specific network attack surface susceptible to those risks, the likelihood of exploitation, the potential impact, available mitigating controls, and the cost/benefit of deploying those controls. If this were asked during an interview as a form of security aptitude/experience test, the best response would be to ask follow-up questions to clarify the scope and NOT attempt a generic answer from <insert security framework here>. TLDR: Ignore all proselytizing posts responding to this useless hypothetical, AI-generated question.

    Like
    8
  • Contributor profile photo
    Contributor profile photo
    Alexia Wong

    Tuition teacher. Earned Community Top Voice Badge in Teaching in '23 and Community Top Voice Badge in Cybersecurity in '24.

    • Report contribution

    To fix it without causing chaos, you need to first assess the security of the third-party software. This is so that you would know how vunerable it is to a security threat. You need to then make sure that you implement things like multi-factor authentication and strong passwords. This is to ensure that only authorized people would have access to this system. You need to also make sure that the system and devices used to access this system are regularly updated. This is to ensure that they are always equipped with the highest level of security features.

    Like
    6
  • Contributor profile photo
    Contributor profile photo
    SANGRAM PATNAIK

    Manager-DDC&Automation|IIT ROPAR-Minor in AI | Industrial Data Analyst | Driving Digital Transformation| Artificial Intelligence |Project Management| Advance Process Control | OT Cybersecurity

    (edited)
    • Report contribution

    I Fix it by following my simple 7 steps for my OT Cybersecurity which I say : "Strong Walls Lock Data, Protecting Good Cyber" S – Scan (Risk Assessment) W – Whitelist (Application Whitelisting) L – Lock (Access Control) D – Data Segmentation (Network Segmentation) P – Patch (Patch Management) G – Guard (Endpoint Security) C – Cyber Check (Vendor Security)

    Like
    6
  • Contributor profile photo
    Contributor profile photo
    Chris van Schijndel
    • Report contribution

    Same things we’re all already doing - defence in depth… don’t overthink it! Some problems seem new but boil down to ‘more of the same’.

    Like
    5
  • Contributor profile photo
    Contributor profile photo
    Mayur Potdar

    Network Certified Professional | Pursuing Ph.D. | 2X M. Sci. | PCNSE | CCNP | CCNA | Fortinet | Switching, Routing, Firewall, Wireless Configuration | Network Design, Implementation, Monitoring, Troubleshooting|

    • Report contribution

    1 Identify the source 2 Get the business justification before allowing any application through the firewall 3 Isolate the network 4 Regular Windows patch updates 5 Strict Firewall Policy 6 Strict user access 7 Day 0 patch update for Firewall 8 Regular Password Update periodically 9 End User Training 10 Take the regular back up of the system and the critical resources

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    Ved Pattnaik

    Digital Transformation Specialist | Smart Factory।Industry 4.0 Disruptive Innovation | ITechnology Adoption | Digital Centre of Excellence

    • Report contribution

    Vulnerability Assessment, Penetration Testing, Network Segmentation, Network Access Control, Online Asset Inventory, Identification & Authentication, Event Management & Incident Response

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    Avi Anand

    IT Risk Manager @ Bough Consulting | Aspiring CISO | Focused on IT Risk Management, Security Controls, and Emerging IT Trends.

    (edited)
    • Report contribution

    Contain Containment without chaos is best achieved through a surgical approach: first, isolate the vulnerable software using micro-segmentation to restrict its network access, then throttle its interactions to prevent widespread disruption while you patch or replace it. Simultaneously, implement adaptive access controls and decoy mechanisms—redirecting suspicious activity to honeypots—to monitor and neutralize threats in real time without affecting critical operations.

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    A K.

    This old account got spam ! No longer in use ! I will update my new linkedin account details on the post .Please don't send a request 🙏! Thanks & Regards, Anuradha Kaushik

    • Report contribution

    Here's is the steps ,always to take care :- 1.Before installing a third party app, carefully examine the permissions 2.Minimum permissions to implement on third third party software. 3.Strong Password ( MFA) 4.Check the third party software reputations from reviews. 5.Educate users 6.Check through tools 7.Patches should be updated. 8.Implement Access Control 9. Third Party Software is Kept up to date 10. Use VPN

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    Ashok Khandare

    Cloud Reliability | Deployment Professional | 4X GCP | ScienceLogic | DevOps | AWS | Kubernetes | Terraform | JMX

    • Report contribution

    Network security risk from third-party software must be addressed without disruption. First isolate and assess the software to identify vulnerabilities. Restrict access using network segmentation and least privilege principles. Analyze business impact vs risk to determine if patching or replacement is needed. If retention is necessary apply security hardening and continuous monitoring. Enforce firewall rules and anomaly detection to prevent potential threats. If removal is required, implement a phased transition plan for minimal impact. Need to educate teams. Strengthen vendor security assessments and supply chain protections. Proactive monitoring and improved policies ensure long-term network security

    Like
    2
View more answers
Network Security Network Security

Network Security

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Network Security

No more previous content
  • Your network security is at risk due to an insecure IoT device. How will you prevent a potential data breach?

    10 contributions

  • Your team is accused of a security breach they didn't cause. How do you prove their innocence?

    13 contributions

  • Struggling to explain network security protocols to non-technical colleagues in a remote work setup?

    14 contributions

  • Employees are bypassing VPN protocols in your company. Are your network security measures enough?

    7 contributions

  • Your remote team relies heavily on VPNs. How can you safeguard against potential vulnerabilities?

    11 contributions

  • You're integrating third-party software into your network. How do you mitigate the security risks?

    6 contributions

  • You need to address a diverse audience on network security. How do you make your presentation effective?

    9 contributions

  • Clients are worried about complex access control measures. How do you ease their concerns?

    7 contributions

  • Ensuring robust security is critical for your network. How do you maintain seamless access?

    2 contributions

No more next content
See all

More relevant reading

  • Vulnerability Assessment
    How do you keep your vulnerability enumeration software and hardware updated and secure?
  • Quality Assurance
    What is the best way to ensure your testing process is secure?
  • Technical Support
    What software maintenance tasks should you perform regularly?
  • Program Coordination
    How can you ensure program coordination tools protect sensitive information?

Explore Other Skills

  • Programming
  • Web Development
  • Agile Methodologies
  • Machine Learning
  • Software Development
  • Data Engineering
  • Data Analytics
  • Data Science
  • Artificial Intelligence (AI)
  • Cloud Computing

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
11
59 Contributions