Do You Make These User Control Consideration Mistakes?
Discussing cyber extortion got the wheels turning about trust and reliance on our increasingly distributed IT ecosystems. Outsourcing IT functionality causes certain IT controls to be a fleeting afterthought for the user entity — the service provider will handle it, right? Well, maybe not. That’s where a Service Organization Controls (SOC) report comes in handy. […]