Additional information
Source: Web-site of vendorFunctionality complies with task
Manage Risks
Ensure Security and Business Continuity
Risk or Leaks of confidential information
Risk of attacks by hackers
No IT security guidelines
Shortage of inhouse IT resources
High costs of IT personnel
Risk of data loss or damage