IT providers have become a target for hackers. The software we use to remotely manage client computers and networks adds an attack vector. Losing control of one of these tools would allow remote access not only to our systems, but all client systems we service.
We will discuss:
- What network and system access levels are appropriate for service providers.
- Who is responsible for security and operations when outsourcing IT services.
- What are we doing to reduce the risk to our clients.
- As this issue comes to the attention of our clients, how do we discuss it with them?