Continue reading "IT: Secure services"
IT: Secure services

In the first of a two-part analysis, Dr Sam De Silva looks at the use of the outsourcing contract to manage security risks ‘The number of users with access to the system increases when a customer’s functions are outsourced to a third party. This in turn can increase the likelihood of the system being breached.’The …