United States

Avoiding risks when choosing a managed Information Technology services provider

WHITE PAPER  | 

Download whitepaper

Small to midsize companies are implementing managed information technology services strategies at a growing rate, capitalizing on efficiencies and cost savings by outsourcing specialized and noncore functions. However, as the amount of provider and technology options grow, organizations must understand how to choose the right provider and manage capabilities and limitations. Managed information technology services can provide, many benefits, but companies must implement a thorough strategy to ensure the proper services are delivered and risks are effectively mitigated.

Outsourcing is on the rise because many companies have trouble keeping up with innovation, but require enhanced features and functionality to stay competitive. In-house knowledge is often limited and hiring and retaining information technology talent can be difficult. Turning to external resources can expand capabilities, but without the proper oversight, outsourcing can actually increase risks, rather than reducing them.

Potential risks from choosing the wrong managed information technology services provider include large-scale data breaches, data ownership issues and data loss. In addition, many organizations do not realize that managed services agreements transfer responsibility for control performance, but do not normally relieve the company of liability for data, operational or reputational risks. Organizations must take proactive steps to increase knowledge and leverage available resources to understand threats and manage risks.

AUTHORS


How can we help you?

Contact us by phone 800.274.3978 or
submit your questions, comments, or proposal requests.


Receive Risk Bulletin by Email

SUBSCRIBE


Cybersecurity Rapid Assessment®

Complete our Cybersecurity Rapid Assessment form to be contacted about receiving our "quick-hit" evaluation of your organization’s overall security risk.

LEARN MORE




Events/Webcasts

IN-PERSON EVENT

Meet RSM at the 2018 IIA GRC Conference!

  • August 13, 2018

RECORDED WEBCAST

Understanding the impact of the NAIC Data Security Model Law

  • August 09, 2018