DATAMARK white paper offers guidance in an era of increasing cyber threats
Every year, it seems information security breaches get bigger and costlier for companies and their customers.
The year 2016 was no exception.
Cybercriminals perpetrated headline-making cyber attacks that resulted in unauthorized access, website shut-downs, and personal information theft. They included the massive DDoS attack that October on DNS hosting provider Dyn that disrupted a number of popular sites, including PayPal, Twitter, and Netflix.
That February, hackers compromised a U.S. Dept. of Justice database of personal information of tens of thousands of Homeland Security and FBI employees.
And Yahoo got hit with what has been described as the biggest data breach in history: The company revealed in December of that year that tens of millions of its customers’ accounts had been compromised.
It’s hard enough for organizations to secure information and maintain authorized access control within their own networks and servers, so consider the challenges companies face when data is shared with third parties. Information resources need to be protected, as is the case when outsourcing business processes to service providers.
CIOs and chief information security officers (CISOs) have the power to drive cybersecurity strategies and policies to protect customer confidentiality, data integrity, data availability, and proprietary information used in internal business processes.
But what happens when the process is handed off to a business process outsourcing (BPO) provider? Where does one begin to ensure that company’s information system security remains secure during and after the transition to a BPO provider?
This issue is the topic of “Addressing BPO Information Security: A Three-Front Approach,” a new white paper now available for download from DATAMARK.
The paper examines best practices and considerations regarding the three vanguards at the forefront of data protection: facility security, human resources security, and network security.
In addition to a high-level review of current information system security best practices and guidelines for BPO providers, the document offers an extensive checklist of questions clients can ask to learn more about a provider’s strategies, policies, controls, and tools for delivering information security measures.