Additional information
Source: Web-site of vendorThe project has been delivered on schedule
The budget has not been exceeded
Functionality complies with task
The project has been delivered on schedule
The budget has not been exceeded
Functionality complies with task
Ensure Security and Business Continuity
Unauthorized access to corporate IT systems and data
No control over data access
Malware infection via Internet, email, storage devices
Risk of attacks by hackers
No IT security guidelines