Processor: Evaluate The Security Of Providers & Contractors

Network and data security are crucial to protecting your business, but you also have to think externally and keep track of what happens when you connect to a service provider or in situations where a contractor has to actually physically interact with your infrastructure. In those situations, you have to evaluate whether a provider’s security practices are up to your standards and make sure you have policies in place to monitor contractors inside your facility so they don’t purposefully or inadvertently infect or otherwise impact your business-critical internal systems. 

Service Providers 

Companies are outsourcing workloads to third-party service providers more than ever before in an effort to save money and gain agility. Even though there are benefits, it’s important to understand that you are essentially taking potentially business-critical workloads and moving them away from your data center, which has some inherent risk. 

To overcome those risks, you can take three approaches, says James McCloskey, director, advisory services— security and risk at Info-Tech Research Group.

Click here for the full article

Media Kit

Info-Tech Research Group Media Kit

Download Now

To speak to one of our Analysts,
Contact Info-Tech Public Relations

or call:
US: 1-888-670-8889
Canada: 1-844-618-3192
International: +1-519-432-3550

GET HELP Contact Us
VL Methodology