Additional information
Source: Web-site of vendorThe project has been delivered on schedule
The budget has not been exceeded
Functionality complies with task
The project has been delivered on schedule
The budget has not been exceeded
Functionality complies with task
Unauthorized access to corporate IT systems and data
Risk or Leaks of confidential information
Employee personal use of corporate IT during working hours
No centralized control over IT systems
High costs of routine operations
No control over the state of communication channels
Risk of lost access to data and IT systems
Non-compliant with IT security requirements
Insufficient risk management
Ensure Security and Business Continuity
Ensure Compliance
Manage Risks