TL;DR
Australian SMBs should not sign with a SaaS platform or outsourced IT provider until they answer a short, structured security questionnaire. This ACSC-aligned vendor risk assessment template gives you 15 practical questions, a Red/Amber/Green scoring method, and clear decision rules so you can spot risky vendors before they become your problem.
Why Australian SMBs need a vendor risk checklist
Get Our Weekly Cybersecurity Digest
Every Thursday: the threats that matter, what they mean for your business, and exactly what to do. Trusted by SMB owners across Australia.
No spam. No tracking. Unsubscribe anytime. Privacy
Every Australian SMB now depends on third parties: cloud accounting, payroll, CRM, managed IT, cyber tools, backup providers, and industry-specific SaaS. That convenience creates concentration risk, because a weakness in one vendor can expose many customers at once.
Recent 2026 software supply chain incidents showed how quickly trust can break when vendors, packages, or CI/CD environments are compromised. The lesson for SMBs is simple: do not assess a vendor on features and price alone. Assess whether they can protect your data, detect incidents quickly, recover operations, and tell you the truth when something goes wrong.
Free Resource
Get the Free Cybersecurity Checklist
A practical, no-jargon security checklist for Australian businesses. Download free — no spam, unsubscribe anytime.
Send Me the Checklist →The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and the Information Security Manual (ISM) both emphasise foundational controls such as access control, logging, encryption, secure configuration, incident response, and business continuity. Your vendor assessment should map back to those principles, even if your business is not formally required to comply with the ISM.
The 15-question ACSC-aligned vendor risk assessment template
Send these questions before contract signing and insist on written answers.
- Are you currently certified to ISO/IEC 27001, or actively audited against an equivalent information security framework?
- Do you have a current SOC 2 Type II report, independent security assessment, or other third-party assurance report available under NDA?
- Where is customer data stored, processed, and backed up, including primary and disaster recovery locations?
- Can you provide a current list of sub-processors or subcontractors that may access, host, or process our data?
- What is your breach notification SLA, and within how many hours of confirmed or suspected compromise will you notify customers?
- Is all customer data encrypted in transit using modern TLS and encrypted at rest using industry-standard controls?
- Is multi-factor authentication enforced for your administrative staff, support staff, and customer admin accounts?
- How do you manage privileged access, and do you apply least-privilege access controls for internal staff and contractors?
- How often do you perform penetration testing, who performs it, and will you provide an executive summary of findings and remediation status?
- Do you maintain a documented incident response plan, and has it been tested through tabletop or live exercises in the past 12 months?
- Do you maintain central logging and monitoring capable of detecting unauthorised access, suspicious admin activity, and data exfiltration attempts?
- What is your business continuity and disaster recovery capability, including recovery time objective (RTO) and recovery point objective (RPO)?
- Can customer data be exported in a usable format on request, and what happens to our data at contract termination?
- How do you secure software changes, updates, and third-party dependencies in your development and deployment pipeline?
- What contractual security commitments will you include regarding notification, audit rights, data handling, access revocation, and secure deletion?
These questions align well with ISM themes including identity and access management, cryptographic controls, event logging, incident management, system assurance, and availability.
How to score vendors using Red, Amber, Green
A simple scoring model helps SMBs make decisions quickly without pretending every vendor needs a full enterprise audit.
Green means the vendor provides clear, specific, written evidence and mature controls. Examples include current ISO 27001 certification, documented MFA enforcement, named Australian or approved data residency options, defined breach notification timeframes, annual penetration testing, and tested recovery plans.
Amber means the vendor has partial controls, vague answers, or controls that exist but are not consistently enforced. Examples include “MFA available but not enforced”, “penetration testing performed occasionally”, or “data may be processed globally depending on service architecture”.
Red means the vendor cannot answer, refuses to share basic security information, has no incident response process, no meaningful access control, no sub-processor transparency, or no defined notification SLA.
A practical SMB scoring approach:
- Green = 2 points
- Amber = 1 point
- Red = 0 points
Decision guide:
- 25-30 points: Low relative risk. Suitable for most SMB use cases, subject to contract review.
- 18-24 points: Medium risk. Proceed only with remediation actions, stronger contract clauses, or limited data exposure.
- 0-17 points: High risk. Do not proceed unless the service is business-critical and compensating controls are in place.
Override rule: any Red on breach notification, MFA enforcement, encryption, privileged access, or business continuity should trigger legal and security review before signing.
ISO 27001 SMB Starter Pack — $97
Everything you need to start your ISO 27001 journey: gap assessment templates, policy frameworks, and implementation roadmap built for Australian SMBs.
Get the Starter Pack →What good answers look like in practice
The best vendor responses are short, precise, and evidence-backed. “We are ISO 27001 certified, certificate available on request” is better than “we follow best practice”. “We notify customers within 24 hours of confirmed breach” is better than “we notify promptly”.
Australian SMBs should also look for contract language that matches the questionnaire. If the sales team promises rapid notification, Australian hosting, or strong backup coverage, those commitments should appear in the agreement, statement of work, or security schedule.
For higher-risk vendors, such as managed IT providers, payroll systems, medical software, finance platforms, or any service handling sensitive customer information, ask for supporting documents. Useful evidence includes a security overview, penetration test summary, architecture diagram, data retention policy, and business continuity summary. If a vendor refuses every request, that is a risk signal in itself.
FAQ
Yes. SMBs are often targeted through weaker suppliers, MSPs, and cloud platforms because attackers know smaller firms have less internal security capacity. A lightweight questionnaire is far better than blind trust.
No. ISO 27001 is a useful signal, but it is not a substitute for checking data residency, breach notification, MFA, incident response, sub-processors, and continuity arrangements. Certification should support your assessment, not replace it.
That is common for detailed evidence, but they should still answer the questions at a summary level and share assurance documents under NDA where appropriate. Refusing basic transparency is a warning sign.
Not always, but you should know exactly where it goes and whether cross-border processing creates legal, contractual, or operational risk. For regulated or sensitive data, Australian residency is often preferable.
Conclusion
Vendor risk is now a core business risk for Australian SMBs. Use this 15-question ACSC-aligned template before every new SaaS purchase, outsourced IT engagement, or major contract renewal, then score each vendor Red, Amber, or Green so decisions are consistent and defensible.
If you want help turning this checklist into a procurement template, supplier onboarding form, or contract review process, visit consult.lil.business for a free cybersecurity assessment.
References
- ACSC Small Business Cyber Security Guide
- ACSC Essential Eight Maturity Model
- Australian Government Information Security Manual (ISM)
- NIST Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (SP 800-161 Rev. 1)
- SANS: Third-Party Risk Management Framework
Work With Us
Ready to strengthen your security posture?
lilMONSTER assesses your risks, builds the tools, and stays with you after the engagement ends. No clipboard-and-leave consulting.
Book a Free Consultation →TL;DR
- A company called Marquis Software Solutions helps over 700 banks with marketing and data — and hackers broke into Marquis, not the banks themselves. But because Marquis had bank customer data, over 800,000 people got their personal info exposed [1][3].
- The hackers got in through a known security flaw in a firewall product that had a fix available — like leaving a broken lock on the front door even though a new lock was ready to install [6].
- It took four months for anyone to tell the affected people what happened [1].
- The fix-up work Marquis did afterward — installing monitoring tools, changing passwords, rebuilding systems — is stuff that should've been there from the start [1][8].
What Happened? Think of It Like a Neighborhood
Imagine your bank is a house with good locks and cameras. But you hire a lawn-mowing company and give them a spare key to the backyard shed — the one with important paperwork inside.
Marquis Software Solutions is that lawn-mowing company. This Plano, Texas firm helps over 700 banks with advertising and data work. Banks gave Marquis access to customer names, Social Security numbers, addresses, birthdates, and bank account details [1].
On August 14, 2025, hackers didn't break into any bank. They broke into Marquis — the company with spare keys to 700+ sheds. One break-in, 80+ banks affected, over 800,000 people exposed [1][3].
How Did the Hackers Get In?
Marquis used a firewall (like a front gate) made by SonicWall. That gate had a known broken latch — security experts rated it 9.3 out of 10 for danger, and a fix was available [6]. But Marquis never installed it. Hackers — possibly a group called Akira — walked right through [4][7].
SonicWall products have appeared on the government's "known broken locks" list 14 times. Eight of those were used in ransomware attacks, where hackers lock your files and demand money [4].
Why Did It Take So Long to Tell People?
The break-in was in August 2025. People weren't told until December — four months later [1][3]. That's four months of stolen Social Security numbers floating around while victims had no idea. IBM's research shows breaches already take an average of 277 days to contain, and adding silence makes it worse [8].
What Should You Do?
- Check the mail for breach notification letters from your bank.
- Freeze credit reports at Equifax, Experian, and TransUnion — it's free and stops anyone from opening fake accounts in your name.
- Watch bank statements for transactions that don't belong.
- Use strong, unique passwords — a password manager helps.
- Turn on two-factor authentication — that extra code when you log in adds a second lock to the door.
FAQ
A third-party data breach is when hackers don't attack your company directly — they attack a company your company works with. In this case, hackers attacked Marquis Software Solutions, which had access to bank customer data. The banks themselves weren't hacked, but their customers' data was still stolen because it was stored at Marquis [1].
The stolen data includes people's full names, Social Security numbers, home addresses, phone numbers, dates of birth, and bank account information. This is enough for criminals to try to steal someone's identity or open fake accounts [1][3].
The Maine Attorney General filing lists 672,075 people. Across all state filings, the number is over 823,000. The real total could be as high as 1.35 million people across 74 to 80+ banks and credit unions [1][3].
Yes — this appears to be a ransomware attack, where hackers lock up data and demand payment. Reports suggest Marquis may have paid the ransom, based on a filing by Community 1st Credit Union that was later deleted [1].
Freeze your credit at Equifax, Experian, and TransUnion — it's free and it stops strangers from opening accounts in your name. Monitor your bank accounts for unfamiliar activity. Use unique passwords and turn on two-factor authentication wherever you can. These steps won't undo a breach, but they make stolen data much harder to use against you [8].
Want to Make Sure Your Vendors Aren't the Weak Link?
Whether you run a small business or manage IT for a larger organization, understanding who has access to your data — and how they protect it — is one of the most important things you can do.
Talk to lil.business about vendor risk →
References
[1] H. Kanapi, "US Banks Hit by Massive Third-Party Data Breach," The Daily Hodl, Mar. 21, 2026. [Online]. Available: https://dailyhodl.com/2026/03/21/us-banks-hit-by-massive-third-party-data-breach-sensitive-information-of-672075-people-potentially-exposed/
[3] Maine Attorney General, "Data Breach Notifications," 2026. [Online]. Available: https://www.maine.gov/agviewer/content/ag/985235c7-cb95-4be2-8792-a1252b4f8318/data-breach-notifications.html
[4] CISA, "Known Exploited Vulnerabilities Catalog," 2026. [Online]. Available: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
[6] NIST, "NVD - CVE-2024-40766," 2024. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2024-40766
[7] Arctic Wolf Labs, "SonicWall VPN Credential Theft Analysis," 2025. [Online]. Available: https://arcticwolf.com/resources/blog/
[8] IBM Security, "Cost of a Data Breach Report 2025," IBM, 2025. [Online]. Available: https://www.ibm.com/reports/data-breach