Outsourcing primarily takes away your personal span of responsibility around the activities you are outsourcing. However, you now have to rely on a third party to take the same care and due diligence that you would take. For example, if you hire a guard company, you have to ensure that the post orders are maintained to your standards; you have to ensure that they complete the background checks with the same due diligence that you would; their training program must meet your needs. The same goes for the installation of security devices: Are they wired properly? If you have an enterprise system, is your outsourcer doing the virus updates? Is there a firewall? You must consider all the security risks that you might have if you did all the activities in-house, but you have to rely on others to ensure that the work gets done. Related content brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe