Additional information
Source: Web-site of vendorFunctionality complies with task
Ensure Security and Business Continuity
Manage Risks
Decentralized IT systems
Risk of attacks by hackers
No IT security guidelines
Risk or Leaks of confidential information
Shortage of inhouse IT resources
High costs of IT personnel
Risk of data loss or damage