Are We e-Protected?
 |
(gif from: pinterest.com)
|
The Philippines has been consistently named as the social media capital of the world since 2015 until 2020 due to its population’s high social media and internet usage. In a figure presented by DataReportal, in January of 2021, 73.91 million Filipinos were listed as internet users. The number of internet users in the Philippines increased by 4.2 million (+6.1%) between 2020 and 2021. (datareportal.com)
Despite the Philippines’ high social media savvy population it lacks data protection mechanisms which makes it exceedingly vulnerable to cyber-threats and attacks.
 |
(gif from: pinterest.com) |
Establishing an IT security system reduces the organization’s vulnerability to cyber-attacks. However, since most organizations in the Philippines do not have the capability to establish an IT security system, they outsource their IT security from different local and international cyber security and tech companies.
Outsourcing an IT security system may be a good idea when an organization aims to reduce the cost in comparison to establishing one themselves. However it also brings potential issues and problems in the future.
 |
(gif from: pinterest.com) |
Antonucci, Lordi, and Tucker (1998) outlined the potential issues of outsourcing an IT security:
Loss of Control. Antonucci, Lordi, and Tucker (1998) argue that no outside vendor can match the responsiveness and service levels offered by an in-house function, largely because the outsider is not subject to the same management direction and control as employees.
Less Flexibility. The outsourced company provides the level of IT services specified in the contract using the technological platform it deems appropriate, a company may lose the flexibility of moving to new computing platforms (Antonucci, Lordi, and Tucker, 1998).
Being Held Hostage. Outsourcing allows the user to become a hostage of the vendor where the company may lose technical staff and be locked into the vendor's proprietary software and hardware (Antonucci, Lordi, and Tucker, 1998).
 |
(gif from: pinterest.com) |
In order to minimize these potential issues that may arise from outsourcing an IT security, the organization must establish a business continuity plan (BCP).
Establishing a business continuity plan makes sure that when potential issues and threats arise after the turnover of the IT security system, the organization already has a system of prevention and recovery. The business continuity plan ensures the timely and orderly resumption of an organization’s essential, time-sensitive processes with minimal interruption when the issues outlined above happen (Reynolds, 2010).
Establishing and outsourcing an IT security is a tedious process, however, it is also the best move an organization without an IT security in place could make to protect itself from cyber-threats and attack.
#CyberSecurity
#Outsourcing
#ITSystem
References:
Antonucci, Yvonne Lederer, Lordi , Frank, and Tucker, James III. (n.d.) The Pros and Cons of IT Outsourcing. Retrieved March 26, 2021 from https://www.journalofaccountancy.com/issues/1998/jun/antonuci.html
Digital 2021 : Philippines. (n.d.). Retrieved March 26, 2021, from https://datareportal.com/reports/digital-2021-philippines
Reynolds,G.W. (2010). Information Technology Management. Cengage Learning
Comments
Post a Comment