Chapter 16. Mapping Technology
At this juncture, many cross-border aspirants like you make glaring mistakes. After legal considerations have been dealt with, some companies go ahead and deploy technologies with a chosen naiveté. They close their eyes and cover their ears. They inaccurately gauge technology-based corporate security by their own country’s standard. Worse, they have a false sense of security—their technology group is on it, or they have outsourced work and therefore believe they have also outsourced security. Consider these facts:
In outsourcing alone, every keyboard you have abroad may have ten users... even though just three may be working on your project. All ten may have direct access to your intranet, your customer data, your ...
Get Mapping Security: The Corporate Security Sourcebook For Today's Global Economy now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.