{"id":1823,"date":"2016-11-15T15:15:13","date_gmt":"2016-11-15T14:15:13","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/en\/six-tips-to-manage-it-outsourcing-risks"},"modified":"2021-12-14T16:01:16","modified_gmt":"2021-12-14T15:01:16","slug":"six-tips-to-manage-it-outsourcing-risks","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/en\/six-tips-to-manage-it-outsourcing-risks\/","title":{"rendered":"Six Tips to Manage IT Outsourcing Risks"},"content":{"rendered":"
As IT security becomes ever more strategic for companies, concern is growing about how secure enterprise data is in the hands of third-party IT service providers. <\/span><\/p>\n As a result, cybersecurity and data protection are now amongst the most challenging issues to be agreed on when negotiating contracts for outsourcing services. This is outlined by Rebecca Eisner, lawyer and partner at Mayer Brown in Chicago, <\/span>in a statement to IT trade journal \u201cCIO\u201d<\/span>. On the one hand, service providers are seeking to minimize their liability for fear of incurring enormous contractual penalties. But on the other, customers are equally concerned – in particular when service providers may not have the same incentives to safeguard customer data as their customers, and also because the negative impact of a security incident is always significantly more severe for the customer than it is for the service provider. <\/span><\/p>\n At the same time, constantly evolving regulations make it extremely difficult for both of the parties to assess the risks. The situation is further complicated by an increasingly complex and geographically scattered IT landscape, Eisner goes on to say. In the days when company data was still stored at one or a few centrally located data centers, companies were able to do a decent job of securing the perimeters. But in this age of cloud storage and mobile end devices, the prospect of securing data has become rather more daunting. \u201cThe points of access and potential points of security failure multiply with this ever expanding ecosystem,\u201d explains Eisner. \u201cIn addition, many of these systems are provided or managed by third party suppliers.\u201d<\/span><\/p>\n So CIOs would do well to pursue a risk management led approach when selecting, commissioning and supervising their IT service providers. Eisner lists 6 tips for companies to boost their data protection and IT security in their IT supplier relationships:<\/span><\/p>\n With Retarus as your information logistics service provider you are always on the safe side. Our own data centers distributed around the globe fulfill the <\/span>most stringent requirements for data protection and security<\/span><\/a>. Your data is exclusively processed in accordance with the applicable local regulations and data protection <\/a><\/a>provisions. Retarus relies on a strict system of internal controls, which is continuously audited by a renowned business consultancy. If required, we also make it possible for your auditors to gain personal access to our data centers and allow them the necessary insight into relevant processes. Please feel free to get in touch with <\/span>your local Retarus contact person<\/span><\/a> directly for more details.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":" CIOs would do well to pursue a risk management led approach when selecting, commissioning and supervising their IT service providers.<\/p>\n","protected":false},"author":14,"featured_media":296,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_s2mail":"","footnotes":""},"categories":[36,15],"tags":[249,172,359],"dipi_cpt_category":[],"class_list":["post-1823","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-trends","category-security","tag-data-protection","tag-it-security","tag-risk-management"],"acf":[],"yoast_head":"\n\n