Language Selection

English French German Italian Portuguese Spanish

Insecurities over Indian outsourcing

Filed under
Security

Some say there's little risk, while others warn of serious hazards, including a threat to America's national sovereignty.

In the incident, former call center employees of Mphasis are accused of taking part in a theft of $350,000 from U.S. consumers' bank accounts.

In the wake of the theft, some observers have voiced concerns about the security of data being handled by outsourcers in India, including worries about weak procedures for checking employee backgrounds. According to this school of thought, the Mphasis breach could dramatically dent the amount of call center work shipped to outsourcers operating offshore.

"This was not a lapse of judgment or an issue of poor customer service: The incident was an organized and systematic plot to steal customers' money," John McCarthy, an analyst at Forrester Research, wrote recently. "Forrester believes that this breach, coupled with recent onshore disclosures of sensitive customer data, will have far-reaching negative connotations for the offshore BPO (business process outsourcing) space."

Not everyone shares this view. But even the perception of danger could hurt the market.

A report from rival researcher Gartner played down the security risks but made no bones about the seriousness of the situation. "The entire Indian offshore industry ecosystem--including...the Indian government--must act quickly and decisively to counter the perception that Indian BPO poses a severe security risk," the report said.

Business process outsourcing, or BPO in industry parlance, refers to farming out tasks such as customer service and transaction processing to a separate company. The work could be done in the United States, or completed in lower-wage countries such as India or Mexico. In addition, some organizations have set up their own operations offshore. Shipping tasks offshore has become a controversial issue for U.S. labor advocates.

At the moment, U.S. organizations devote only a small fraction of their budgets for information technology services--including BPO--to low-cost countries, according to a recent Merrill Lynch survey of chief information officers. But that share of the budget is expected to grow over time, from 0.9 percent in 2004 to 1.6 percent in two-to-three years.

Rest of Story

More in Tux Machines

Software: WiFi, GIMP, WordPress

  • WiFi hacker- 10 best Android & Desktop WiFi hacking apps free download
    Hacking is no more the specialty of experts and professionals only. With the emergence of user-friendly hacking tools, the art can be easily aced by average users too. A majority of people want to know the best, free WiFi hacker tools to learn to hack on smartphones and desktops. Despite the availability of so many hacking tutorials online, let us tell you that hacking is not as easy to learn. It cannot be learned overnight and requires in-depth research and dedication to become a pro at hacking.
  • GIMP 2.10.2 Released
    It’s barely been a month since we released GIMP 2.10.0, and the first bugfix version 2.10.2 is already there! Its main purpose is fixing the various bugs and issues which were to be expected after the 2.10.0 release.
  • GIMP 2.10.2 Released With HEIF Image Format Support
    Just shy of one month since the long-awaited debut of GIMP 2.10, the first stable point release is now available. Besides fixing bugs, there is new features too including support for HEIF images for importing and exporting, spherize and recursive transform filters added, improved histogram computation, and more.
  • GIMP 2.10.0 released. How to install it on Fedora or Ubuntu
  • WordPress 4.9.6 Update Helps Websites Prepare for GDPR
    The open-source WordPress content management system project announced its 4.9.6 update on May 17, providing users with privacy enhancements designed to help sites be compliant with the European Union’s General Data Protection Regulation. GDPR is set to go into effect on May 25, requiring organizations to take steps to protect the privacy of end- user information. To be compliant with GDPR, organizations need to properly disclose how user data is stored and used. "It's important to understand that while the GDPR is a European regulation, its requirements apply to all sites and online businesses that collect, store, and process personal data about EU residents no matter where the business is located," WordPress developer Allen Snook wrote in a blog post.

Games: Turmoil, INSOMNIA: The Ark, Survivors of Borridor, Crashlands

Linux 4.17 RC6

  • Linux 4.17-rc6
    Things continue to be fairly calm. There's a couple of commits in here that aren't "trivial few-liners", but most of it really is pretty small. And in fact, a quarter of the full patch for the week is tooling - and the bulk of that is the testing subdirectory. In fact, drivers are in the minority here, because another 30% is arch updates (arm, s390, x86), and we even have more lines of filesystem fixes than we have driver fixes (admittedly mostly due to a few of the more-than-a-few-liner patches being to filesystems: afs and btrfs). We do have a few driver fixes (all over - hwmon, usb, sound, acpi, gpu), but it's all really small. So nothing special to report. Go read the shortlog, pull the changes, build, and test. It should all be good and pretty stable by this point. Linus
  • Linux 4.17-rc6 Kernel Released As Another "Fairly Calm" Release
    Linux 4.17 is up to its sixth weekly release candidate ahead of the official release expected by mid-June.

KDE Plasma 5.13 Looks Like an Awesome Update

The KDE Plasma 5.13 release is shaping up to be something rather special indeed. Currently in development, KDE Plasma 5.13 serves as the next major release of the leading Qt/Qml desktop environment. The update features a stack of improvements, refinements and some innovative new functionality. In this post we roundup the best KDE Plasma 5.13 features and changes, plus give you all the details on how to upgrade to Plasma 5.13 in Kubuntu and KDE Neon once it is released on June 12, 2018. Read more Also: First week of coding phase, GSoC'18