What are the risks associated with using an AM provider? How can I manage them?
Recently, attackers have leveraged weaknesses within third-party suppliers’ systems to access customer data or infrastructure. You can manage many of these risks during the vendor assessment stage, but organizations must know what to look for to do so properly. The best questions revolve around the vendor's tools and procedures, the degree of qualification of their operations staff, and their uptime or availability metrics, service level agreements (SLAs), and disaster recovery capabilities.