IT outsourcing growing niche

Home » Technology

IT Aric Bandy Evan Francen

Aric Bandy, left, CEO of a Minneapolis IT provider, joins Evan Francen, president of security-audit consulting firm FRSecure, in a server room in Minneapolis. Mr. Francen’s company checks whether technology security will meet auditors’ standards.


MINNEAPOLIS — Big banks, hospitals, and insurance companies worry about computer security because they handle so much personal information.

Now, in the age of outsourcing, they also have to worry about whether their partner firms are secure. And that’s led to a new kind of business consultant: The information security auditor who determines how much security is enough.

Some of these auditors work for big companies. When Evan Francen did security audits for Wells Fargo bank, he asked the outsourcing companies to complete a 1,500-question security checklist. (Wells Fargo officials declined to comment.)

Now Mr. Francen has his own security firm, FRSecure of Chaska, Minn., that helps outsourcing firms meet the demands of security auditors. Some of them really need the help.

“We audited a small bank that was compliant with computer security regulations, but we could have put them out of business in five minutes because of the physical risk,” Mr. Francen said. “Their computer server room had no camera surveillance, no records of who came or went, no locked doors, nobody there at night, and it was in a separate building.”

The opportunities in security auditing also have drawn the consulting arms of big accounting firms such as the accounting firm Deloitte.

“Every time there’s another computer security breach, these security audit programs get ramped up quite a bit,” said Matt Marsh, a partner in enterprise risk services at the Minneapolis office of Deloitte. “Because if there’s a breach there can be costs, loss of reputation and loss of business.”

Computer security breaches, such as the massive e-mail leak this year at corporate outsourcer Epsilon have become common.

Cloud computing, which saves companies money by letting them use remote data centers when needed, poses risks about which little is known. And big companies are under more regulatory and legal scrutiny.

For information technology consultants, this is a boon.

“A lot of these security rules were written by non-IT people, and they aren’t specific enough to give IT professionals a clear idea of how to set up security — and there are a lot of different ways to do it,” said Aric Bandy, chief executive officer of Agosto Inc., a Minneapolis IT outsourcing company that does work for Goodwill Industries, the Minnesota Wild professional hockey team, and Dunn Bros. Coffee.

“One client wanted us to ensure we had control of who was physically able to access a computer server in our data center,” Mr. Bandy said.

“We already had card access to the data center, personal identification numbers for data access, and a guard. But that wasn’t enough: They wanted a camera focused on that server, and we had to do that.”

Some outsourcers try to spare themselves that kind of anguish by launching a pre-emptive strike: They hire a company such as FRSecure to do a security assessment and develop a security plan that may help ward off some of the more unnecessary security demands of big clients.

“We’ll do a security assessment so the vendor can push back on the security demands of the big company,” said Kevin Orth, FRSecure’s vice president of operations.

For example, if data encryption is too expensive, an outsourcer should develop a less-expensive alternative, such as surveillance cameras or documented procedures to destroy old disk drives, he said.

That strategy worked for FRSecure customer Action Inc., a Ply- mouth, Minn., direct-mail company that works with banks, health care institutions, insurance companies, and schools.

“The first time you get audited for security, it can be a bit onerous,” said Tony Zirnhelt, Action president. “But now we’ve taken a proactive approach to data security, such as employee training, cameras, data access control, even hiring someone to try to break in through our computer security. We now use our data security in our pitch to prospective clients.”

That may be the most practical solution at a time when data security is so ill defined, Deloitte’s Mr. Marsh said.

“You could encrypt and secure everything to the Nth degree, but that would cost a lot of money,” he said. “So there’s a balance, and each institution has to figure out what that balance is.”

Leave a Reply