Training & Education

The Problem:

Giving external vendors such as outsourced call centres and managed service providers, access to your internal systems greatly increases the risks of theft of intellectual property and/or damage to company infrastructure (mistakes made while deploying code, configuring systems or assigning user permissions, for example).

Even trusted vendors with no malicious intent can potentially damage your systems or leave you open to attack. One of the most infamous instances of this type of breach occurred in 2013 to the American chain store, Target, when a supplier caused a network breach. Before Target’s network admins could react, it was too late. Their network security was breached and sensitive financial data was stolen.
This issue is particularly acute in the healthcare field. On average, hospitals have about 1.5 times the amount of vendors than employees.

The Solution:

RecordTS’s third party monitoring software is a way to ensure external vendors stay within their scope and are only performing their assigned tasks. This allows for more flexible access without sacrificing security. Having monitoring software eliminates “who did what?” doubts, confirms SLA agreements and eases vendor billing verification