Are you putting information at risk by using contractors?


This article can also be found in the Premium Editorial Download "Information Security magazine: Nine tips to guarding your intellectual property."

Download it now to read this article plus other related content.

Continuing Challenge
Risks associated with the use of contractors can't be eliminated entirely. As probably can be said about most technical controls, they are effective at preventing a large portion of the population from doing what we don't want them to do for a time. Unfortunately the worst bad actors can ultimately find ways to circumvent even the best controls given the right amount of time, computing power and/or money.

Changes in technology will continue to make this a challenging problem. Emerging trends such as the growing availability of inexpensive, pervasive wireless broadband provides contractors with high-speed connectivity while on your premises that you will be unable to monitor or restrict. The pace of technology change and the never-ending discovery of vulnerabilities in our basic computing platforms place continuous pressure on information security managers to re-evaluate risks and refine controls.

    Requires Free Membership to View

This was first published in May 2007

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: