In order to fully understand the risks posed by your vendors, you need to closely examine their cybersecurity protocols. To help ensure you gather the information you need when analyzing your vendor's cybersecurity, use this handy checklist.