Quality Plus Consulting - Breakfast Bytes
Technology
Challenges with having baseline 101 level quality IT services
Beware of outsourced help desks
Items to use to assess your IT services provider
The most secure help desk outsourcing is no help desk outsourcing.
There are many ways in which help desk outsourcing can create compliance and security violations.
How Help Desk Outsourcing Undermines Your Security | IT Pro (itprotoday.com)
The user's identity should be validated when they are calling for support. We use a system where end users have support PINs that change and are readable to them and us through a system. That is not the only method of validation.
How should you be investing in equities? You probably are not an industry insider. You probably cannot run a company like the one you are investing in. You don't have tremendous expertise in risk management for that industry. So how are you to make a decision about what company to invest in?
How MSPs are the breach vector for a lot of clients
The BIGGEST issue that creates problems for your business when you utilize any outsourced IT whatsoever is if the service provider's executive management team is not comprised of highly experienced, and highly trained security personnel.
Businesses owned and operated by sales and marketing people usually end up making decisions using the wrong criteria.
Since you cannot do what they do, you have to trust in the management of that company.
Many of these companies have zero ability to assess the efficacy of any security solution or strategy. They use and promote the flavor of the year that they picked up at a conference or that is being talked about in their industry groups and peer accountability groups.
There are tons of IT service providers that say that in order for them to scale, they have to use large help desks of 60 - 200 people or more that end up having administrative access to things in your environment.
Questions for the technology service provider
What type of technology do you use?
Will the same be used to support my company?
How will you manage my current infrastructure?
How will integrations with legacy systems be managed?
Do you use subcontractors?
Practical example of how operational maturity improves productivity while reducing risk
Unlocking Strategic IT Investments and Information Security
Domain/DNS hosting, account ownership, security issues and TCO
Cyber Insurance versus Cyber Warranty
Demystifying IT Services and the Shared Responsibility Paradigm
How establishing requirements properly results in best outcomes
Operational Maturity is required to have Information Security Risk Management
Managing the impact of changing IT service providers
CMMC and latest DoD memo implications and far reaching effects related to FedRAMP
Why the ship has sailed on BYOD
Threats to mobile devices and how to manage them, part 2
Physical threats to mobile phones, SIM hijacking, out of band SMS, and Yubikeys
How to analyze workloads and decide how they should be hosted
How a lack of understanding of business processes relates to adverse financial impact
Email security management and monitoring is critical
CISO, CTO, CIO, what’s the difference?
Zero trust fundamentals
FTC SafeguardsRule, IRS requirements, and tax preparers
Methods to prevent business email compromise
Business survival over the next decade
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
Black Wolf Feed (Chapo Premium Feed Bootleg)
Bannon`s War Room