Lockheed Martin confirms attack on its IT network. Lockheed Martin and RSA are serious players in network security. If they can be hit then your company can be hit. How then can outsourcing lower your risks instead of increasing them?
We have been very serious about network security at Telegenisys ever since our founding in 1994. We don’t have any SecurID tokens of the kind that were used in this attack. We don’t just blindly accept RSA’s word that their systems are totally secure so we should just trust them, because they’re not. We don’t have roving access. When our employees are on the job then they are in our secure facilities. That way we don’t have to worry about the security of home office PCs, because these are not part of our solutions.
And we do point to point connections using tried and true technologies, triple DES and IP restrictions. We are worried about quantum computer attacks, but we don’t think the currently offered solutions have been subjected to enough public scrutiny to be worth implementing. So if your security solution is only secure until the minute that somebody discovers how you do it, then don’t call us, we’re not interested.
We have implemented RSA’s SecureID tokens at the request of one client for their process. We have insisted that the accounts secured by these tokens be limited to the the network addresses of our secure facility for an extra factor of protection. All of our access is of course monitored on both sides.
There is certainly no denying the potential benefits that can be derived through outsourcing, but it would help if the right outsourcing provider is selected. Doing that is not a difficult task, but it's certainly a bit complicated, obviously because the number of providers offering outsourcing services has increased significantly…
Just as a person never forgets how to ride a bicycle, companies have tasks that they must set aside for a while then they'll need to resume without falling over. These cycles for stored tasks can be driven by seasonal markets or by regulatory or financial calendars. In any case…
The first generation of outsourcing involved only the division of work between the client company and the sole source outsourcer. The new model is for process fragmentation, the use of different suppliers and component manufactures in the production of a good or service. This presents significant challenges for outsourcing companies…