Tags » Security Functionality

Practical IT: how to assess a third-party provider's security (part 2)

A month or so ago, I wrote the first part of this article, which focuses on how to assess a third-party provider’s security. Here’s the second part, looking at security functionality. 1,042 more words

Featured

Practical IT: how to assess a third-party provider's security (part 1)


Chances are you’ve already got at least one key application hosted externally.

Did you consider the security implications? It’s very easy to assume that when outsourcing an application, you’re paying someone else to worry about data loss, along with the other issues of data centers, servers, licensing, administration and whatnot. 872 more words

Malware