Image Image Image Image Image Image Image Image Image Image

Outsource magazine: thought-leadership and outsourcing strategy | September 21, 2017

Scroll to top



The tip of the infosec iceberg?

March 20, 2017 |

Recent stories by, amongst others, the BBC detailing large, well-organised and presumably very profitable scamming organisations targeting UK TalkTalk customers have hardly helped the already-lowly reputation of offshore contact centres – but may unfortunately be only the tip of a … Read More

Cyber-attacks: can you contract against damage caused by supplier data breaches?

June 8, 2016 |

The data and cyber regulatory regime in the EU – which includes, for the time being at least, the UK – is undergoing a very significant shake-up. The new General Data Protection Regulation which will come into force on 25 … Read More

Disaster recovery: proactive beats reactive

April 5, 2016 |

Cyber-attacks have topped the list of biggest threats to business for the second year in a row, followed closely by data threats and an unexpected IT/telecoms outage – according to the fifth annual Horizon Scan Report published by the Business … Read More

Global supply chains: understanding and managing key legal risks

January 4, 2016 |

As supply chains become increasingly complex, identifying the legal risks inherent in managing such a widely dispersed network of suppliers, manufacturers and other trading partners is key to spotting issues and being able to solve them as soon as possible. … Read More

2015: the year of the breach

December 11, 2015 |

At the start of 2015, Cisco CEO John Chambers warned that if people thought 2014 was a bad year for hacking, 2015 would be even worse. This was a significant claim to make, considering some of the high-profile attacks last … Read More

Selling security to the end user: avoid FUD

November 25, 2015 |

Without sounding like a broken ringtone, it’s attacks like the TalkTalk breach that, once more, bring IT security to the top of the agenda. I imagine business owners in the past month have been thinking “if TalkTalk can fall victim … Read More

Insider threat

October 9, 2015 |

The organisational struggle to understand insider threat continues and as threat actors go, it continues to be one of the most successful – and potentially devastating to any business. Yet some organisations are still failing to grasp who their insiders … Read More

They hacked the CEO!

February 27, 2015 |

This week, I received an email from the CEO of a well-known customer experience outsourcer. Nothing particularly unusual about this, considering my job, but a few things stood out. See if you can spot anything suspicious in the following:


Read More

Scanning the Horizon: Business Continuity Challenges

April 9, 2014 |

Machines and technology are usually at the centre of all that we do. In the office the work we perform is largely done using a computer – and if you’re out of the office, then it is either on a … Read More

Visions of the Future: The Next Decade in BPO

July 5, 2013 | 2

This article originally appeared in Outsource magazine Issue #32 Summer 2013.

This is an extraordinary time for the BPO space, with huge leaps in business technology, process, and theory taking place against the backdrop of tumultuous economic conditions, the ongoing … Read More

How mobility can compromise security

April 18, 2013 |

When corporations first started connecting their internal networks to the internet, they quickly discovered the importance of security. Fast-moving viruses and worms like the “I Love You Virus”, “Melissa” and “Code Red” could easily move from desktop to desktop clogging … Read More

The Importance of Being Secure

October 4, 2012 |

This article originally appeared in Outsource Magazine Issue #29 Autumn 2012

Companies are speeding up their outsourcing of key internal functions, especially now that cloud computing models have become so popular; this will only increase, and there are new outsourceable … Read More

Cybersecurity requires organisational leadership

September 26, 2011 |

The onward march of information and technology communications will not be halted.

It is bringing huge benefits to government, to national infrastructure, and to the provision of public services, utilities and financial services. And it has transformed our daily lives … Read More

The importance of a robust data strategy

May 19, 2011 |

This month’s column is guest-authored by Yann Souillard, Director, LDC. Yann is responsible for sourcing and completing transactions in the £2m-£100m equity range. He has a BSc in Economics from The Wharton School of Business and grew up in Spain … Read More

Safe and Sound?

April 6, 2011 |

This article originally appeared in Outsource Magazine Issue #23 Spring 2011

The security of data and processes lies at the very heart of outsourcing – but is your organisation doing enough to protect itself and its partners?

Famously, “the strength … Read More