Top 10 Security Questions to Ask Before Outsourcing Any IT - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next If the deal encompasses end points, is the vendor using encryption? -5 Next

If the deal encompasses end points, is the vendor using encryption?

While the vendor will be primarily concerned with demonstrating cost reduction, the client needs to incorporate and enforce security controls on those end points. Technologies like full-disk encryption, media encryption, device firewalls and anti-malware should no longer be optional.

With IT organizations looking everywhere to cut costs, one area that gets a lot of attention is outsourcing. But just as there are security concerns with internal IT, so too are there security issues with external IT service providers. Here are 10 tough questions that IT organizations should be asking about their IT service providers.

More Slideshows:

Identity Eight Top Google Apps for Productivity Eight of the highest-rated apps for productivity from the Google Apps Marketplace.

12 Hot New Tablets Hitting the Market The market is expanding at a brisk pace with many new competitive tablets being introduced to the public.

10 Good Ways to “Tell Me About Yourself” You know it’s coming, so be prepared with an answer that grabs their attention.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.