1. Make a list of all 3rd party systems you are using and try to find the problematic ones and their effect on critical business processes
2. Evaluate substitution of the most critical ones, especially the ones having no strict SLA's
3. Use special tech architecture design patterns to avoid real-time connections with 3rd party systems you unable to replace