Loss of Control By far and the foremost inherent risk of outsourcing is the “Loss of Control” on the outsource process. While outsourcing the IT Security processes, this at times can prove to be the worst nightmare for the organization’s management. The most common of the concerns, triggered by the decision to outsource lies with …
Outsourcing of IT Services is the trend of today, and why not it helps an organization in focusing towards its core business where the strength lies. Why should an organization spend the time, effort and other resources where it does not specialize and which is not its core area of operations. The first and foremost …
I had written this article in November 2005, when there was a article published on VOIP Softwares by Jim Wagner, well the summary of the same is – “Researchers: Skype, VoIP Are Hot And Risky” by Jim Wagner. As per this article, the research firm noted in an recent advisory, Skype doesn’t leave an audit …
Information Security has become the need for survival of the Business today. Irrespective of the Geographic Location or Industry sector, following could be identified as the common Driving factors for the Information Security – Information Security Threats and Risks Any information system usage or implementation may be a target for range of serious threats, including …
Information Security has three basic principles commonly referred to as the CIA Triad of Information Security (i.e. Confidentiality, Integrity and Availability). These principles include standards, conventions and mechanisms that form the basis for defining and implementing security controls and practices. In addition to the base principles (i.e. confidentiality, availability and integrity), there are the few …
IT Security and Information Security are the two different domains often misunderstood as one. Though both of them have some common areas that are to be dealt, but by large, IT Security is a subset of Information Security. IT Security deals with the technical set of controls and revolves more around the technological deployments across …