Additional information
Source: Web-site of vendorFunctionality complies with task
Ensure Security and Business Continuity
Manage Risks
Risk of attacks by hackers
Decentralized IT systems
No IT security guidelines
Risk or Leaks of confidential information
Shortage of inhouse IT resources
High costs of IT personnel
Risk of data loss or damage