A client who was receiving an IT service from a Business Process Outsource (BPO) provider experienced a security incident which was declared closed by that provider.
Further scrutiny was requested by the client for assurance purposes. Upon scrutiny, we reported that the threat persisted in the client’s environment.
The threat was characterised, dealt with and architectures adjusted to reduce the risk of the threat manifesting in future. The BPO provider also reviewed incident management protocol.