Download This Special Report

Tuesday, April 05, 2005

How Computer Consultants Can Safely Hire Security Subcontractors

Does your computer consulting business need to bring in subcontractors from time-to-time to supplement your “bench” of technical expertise?

Do you often bring in security experts, but wonder if you’re really taking the most sound precautions for protecting your clients and your computer consulting business from independent security subcontractors?

If so, then don’t miss this article I came across from SearchSecurity.com that talks about “Six essential security policies for outsourcing” by Kevin Beaver, CISSP.

While this article was clearly written from the standpoint of a LAN manager or IT director in a corporate IT environment, owners of computer consulting businesses can glean quite a bit on security best practices that must be adopted… if you need to protect your clients and your computer consulting business from independent security subcontractors.

And if you need help locating independent contractors and learning how to structure the relationship and paperwork for partners and subcontractors, be sure to review the partnering and subcontracting modules of the Computer Consulting Kit.

Best regards,

Joshua Feinberg, author
Computer Consulting Kit
http://www.computerconsultingkit.com/