Hi,
So im working on this really really annoying essay. I just kind find any sources on the web that explain: "Why would management prefer substandard internal security to professional outsourcing"
I've searched all over the damn net for some sites that might be useful, but i cant find any.
Please please help me, any articles, sites or anything would be very much appreaciated.
thanks in advance,
damebec
3 2902 DeMan 1,806
Top Contributor
I can't point you offhand to any articles, however here are some of my own ideas on the topic....
Substandard Internal security is probably cheaper.
There is a percieved security threat in outsourcing anything (especailly security)
People are probably comfortable/oblivious to the fact tat there internal security is substandard
Management tend to be (yes I know, I;m stereotyping) skeptical (sceptical?) about claims that someone else will do a better job than their own internal people (ironically, they often seem happy to tell their employees the opposite).
sicarie 4,677
Recognized Expert Moderator Specialist
I can't point you offhand to any articles, however here are some of my own ideas on the topic....
Substandard Internal security is probably cheaper.
There is a percieved security threat in outsourcing anything (especailly security)
People are probably comfortable/oblivious to the fact tat there internal security is substandard
Management tend to be (yes I know, I;m stereotyping) skeptical (sceptical?) about claims that someone else will do a better job than their own internal people (ironically, they often seem happy to tell their employees the opposite).
Yeah, a lot of decisions tend to be made around the mindset of a known evil to an unknown evil. You know what you are going to get with internal security, but what if you outsource to the wrong person?
I would also suggest culpability as an outline point - there is someone in the company that they can blame and fire if something goes wrong, whereas with an outsourced security company, there is no control over hiring, over best practice, etc... and while you can refuse to pay and go to another vendor, the person who chose to go to that vendor will most likely be fired... (a high-level firing as opposed to a lower level firing).
AricC 1,892
Recognized Expert Top Contributor
Hi,
So im working on this really really annoying essay. I just kind find any sources on the web that explain: "Why would management prefer substandard internal security to professional outsourcing"
I've searched all over the damn net for some sites that might be useful, but i cant find any.
Please please help me, any articles, sites or anything would be very much appreaciated.
thanks in advance,
damebec
Most likely because outsourcing consultants can be very very very expensive.
Sign in to post your reply or Sign up for a free account.
Similar topics |
by: jonathan.beckett |
last post by:
Hi All,
For the past few months I have been working on an open source
Apache/PHP/MySQL content management system - and have recently made it
available for download.
It's still very much a work in progress (current release version is
0.4.6), but you should get a very good idea of what it's about by
visiting the site (which uses it,...
|
by: jonathan.beckett |
last post by:
Hi All,
I have just made version 0.4.8 of the PluggedOut CMS Content Management
System available for download - it's free, and covered by the GPL.
It's still very much a work in progress (current release version is
0.4.8), but you should get a very good idea of what it's about by
visiting the site (which uses it, funnily enough), or...
|
by: John Bailo |
last post by:
Are there any Indian companies that specialize in Management Outsourcing
where managers would be hired for a few hours a week at low rates to
replace costly overpaid managers?
|
by: craig |
last post by:
I am wondering if there are some best practices for determining a strategy
for using try/catch blocks within an application.
My current thoughts are:
1. The code the initiates any high-level user tasks should always be
included in a try/catch block that actually handles any exceptions that
occur (log the exception, display a message box,...
|
by: Rod |
last post by:
I have been working with ASP.NET 1.1 for quite a while now. For some
reason, opening some ASP.NET applications we wrote is producing the
following error message:
"The Web server reported the following error when attempting to create or
open the Web project located at the following URL:
'http://localhost/WebApplication1'. 'HTTP/1.1 500...
| |
by: Michael Glaesemann |
last post by:
Hello all,
Recently I've been thinking about different methods of managing users
that log into a PostgreSQL-backed application. The users I'm thinking
of are not necessarily DBAs: they're application users that really
shouldn't even be aware that they are being served by the world's most
advanced open source database server. I appreciate...
|
by: jf li |
last post by:
I have a Asp.net web application and a Asp.net Web service application. The
Web application is using HtmlInputFile to get a 50M size of file selected by
end user, read the data of this file and pass the data to the web service. I
already modified both web.config files and changed maxRequestLength to
60000(kb). When I debug the upload process,...
|
by: Learner |
last post by:
we can download the Management Studio Express for free from MS website.
I did the same thing on my personal laptop. But can we develop
applications using free downloaded Management Studio and deploy later
on with the free stuff at work?
Or else may i want to get it off Sql server 2005 that we got when we
bought the software.
|
by: Scott |
last post by:
I've been trying to come up with a way to ensure user input is coming
from the form on my site, and not auto-submitted from elsewhere, and I
don't want to use the "enter the code shown in the image" method. I know
the $_SERVER contents can be spoofed, so I thought of
doing something similar to this:
<?php
session_start();
$code =...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it. ...
| |
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
| |
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating...
| |