These are the companies who outsource their IT support. If their IT support company is using subcontractors, it is possible that they have not run complete background checks
Houston, TX (PRWEB) February 03, 2013
McCann Investigations, a Texas-based private investigations firm released a new video to accompany its case study titled Hiring a Licensed IT Security Professional. The case study discusses the issues that can arise due to the fact that although IT security professionals have access to a company's private and sensitive information, there is no regulatory body that has oversight of these professionals, and there are no licensing requirements.
There are licensing requirements in order to become a computer forensics examiner. There are also licensing requirements to install or sell physical security such as cameras and access control systems. In these cases, individuals must undergo finger printing and FBI background checks. IT security professionals have access to financial records, credit card and social security numbers as well as other sensitive data. They often have certifications, but are not required by law to undergo any extensive background checks other than that of their employer, if their employer requires it.
"Smaller companies are more at risk". says Daniel Weiss, Managing Partner at McCann Investigations. "These are the companies who outsource their IT support. If their IT support company is using subcontractors, it is possible that they have not run complete background checks."
About McCann Investigations:
Call us toll-free at 800-713-7670
McCann Investigations is a full service private investigations firm that specializes in computer forensics (including mobile device forensics), digital debugging, network breach detection and remediation as well as traditional private investigations such as under cover work, surveillance and comprehensive background investigations.
McCann Investigations works with law firms, public and private companies, financial companies and individuals with cases such as divorce, child custody, fraud, embezzlement, digital debugging, intellectual
property theft and network breach.