9 Critical Questions to Ask Your IT Service Provider

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next 9 Critical Questions to Ask Your IT Service Provider-9 Next

Access and Vetting

What level of access do your employees have to customer data, and how are employees vetted?

If you're considering moving to the cloud and entrusting your data with a provider, it's import to understand whether your data will be stored in a way that's readily accessible to the provider's staff. This is particularly relevant if you have sensitive data-at-rest that is subject to compliance requirements.

If employees do have access to customers' data, it's important to know how trustworthy these staff members are. Need an example of this gone horribly wrong? Edward Snowden.

There are plenty of good reasons for outsourcing IT operations to a service provider, but doing so comes with inherent risk. Today's organizations are entrusted with customers' financial data and other sensitive information, so it's never been more important to carefully evaluate potential service providers.

A lot is at stake when it comes to IT management, especially around security practices, business continuity and disaster recovery, supporting a mobile workforce and more. After all, your IT operation is the backbone of your business. You simply can't afford to hire a provider that promises the world and doesn't deliver, or even worse, one that doesn't adhere to the right practices.

In this slideshow, Chris Messer, senior vice president of technology at Coretelligent, outlines the nine important questions organizations should ask prospective service providers to be sure they're getting the right business partner.

Chris Messer is senior vice president of technology at Coretelligent, a leading provider of comprehensive managed IT and private cloud services. Chris works with some of today's most advanced technologies, and he personally architected Coretelligent's geo-diversified private cloud - CoreCloud - as well as Coretelligent's global client monitoring systems. He advises organizations of all sizes on their IT strategies, and helps develop custom roadmaps for private, public and hybrid cloud deployments.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.