top of page
Search

External IT Support: Risks and Issues

  • 10 hours ago
  • 3 min read

Over the past few months, I’ve been looking more closely at something that raises concerns for me.

How much real, practical control organisations retain when their IT service is delivered by an external provider.


The relationship may be great and the SLA met, but three patterns keep surfacing:


  • Concentrated privileged access (single points of failure)

  • Remote access to sensitive data without meaningful friction

  • Customers being charged for access to their own governance information


Individually, each may seem manageable. Together, they point to a real fragility.


1. When Support Becomes Structural Dependency

Many organisations operate in environments where their IT provider:


  • Holds global administrative rights

  • Controls identity and access configuration

  • Manages backup platforms

  • Oversees security tooling and logging

  • Configures conditional access and RBAC


That creates a real dependency.

If the provider is the only party with meaningful administrative capability, then the organisation has effectively outsourced both control and visibility of this high risk domain.

Single points of failure like this are rarely obvious until something goes wrong.


2. Remote Access Without Friction

Remote management tooling is now standard. It enables fast response, patching, configuration and support.

But the governance question is how it is controlled.


  • Is access persistent or time-bound?

  • Are actions logged and attributable to named individuals?

  • Does the customer have visibility of those logs?

  • Can large-scale changes be pushed without explicit oversight?


If a provider can access systems containing sensitive personal data without secondary checks or customer awareness like pop-ups or a permission, then technically the organisation is relying almost entirely on trust.


3. When Governance Information Is Behind a Paywall

A recurring issue I’ve seen is where a customer asks their IT provider for a basic report such as a breakdown of who has administrative access or starters and leavers.


And the response is: “That will be chargeable.”


Technically, that may be contractually valid.


But from a governance perspective, it raises a real red flag.


If an organisation needs to pay a third party to understand:

  • Who has privileged access

  • How roles are configured

  • What permissions exist

  • How access is structured

…then they do not have operational visibility of their own environment.


In many cases, if the customer retained even limited read-only or reporting access, they could extract that information themselves, instantly and at no cost.

This lack of control is concerning to me.


4. Control vs Convenience

Often, these arrangements evolve for convenience:

“It’s easier if they just manage everything.” because “We don’t have in-house expertise.” and “They’re the technical specialists.” This is particularly the case for smaller charities or community providers we support.


But over time, convenience can become:

  • Exclusive admin access

  • Restricted client permissions

  • Opaque role structures

  • Reporting that requires invoicing

At that point, the provider is arguably gatekeeping the IT environment, not just supporting it.

That creates both operational and governance risk.


5. Why This Matters for Data Protection

From a data protection standpoint, this has real implications.


If an organisation cannot independently verify:

  • Who has access to sensitive data

  • Whether least privilege is enforced

  • How special category data is protected

  • What changes have been made


…then oversight is weakened.


The legal status of “data controller” assumes meaningful control.

But meaningful control requires visibility.

And visibility should not depend on whether a purchase order has been raised.


6. The Single Point of Failure You Don’t See

Single points of failure aren’t always technical.

They can be informational.

If:

  • Only the provider can generate access reports

  • Only the provider can export logs

  • Only the provider can modify role assignments

  • Only the provider understands the architecture

…then the organisation’s resilience depends on uninterrupted cooperation.


Resilience requires shared knowledge and recoverability, not just technical uptime.


7. What Good Looks Like

Good governance doesn’t mean distrusting your IT provider but you should be designing the relationship so that:


  • Privileged access is attributable and limited

  • MFA is enforced universally

  • Remote access is logged and visible

  • Backup control is not exclusively external

  • Customers retain reporting-level visibility of their own RBAC and permissions

  • Access transparency is not chargeable


The ability to understand your own environment should not be treated as a premium add-on.


The Real Question

The key question is not:

“Is our IT provider competent?”

It’s:

“If we needed to independently evidence control tomorrow, could we?”


Single points of failure, unrestricted remote access, and paywalled governance information don’t usually cause immediate disruption but they can slowly erode resilience.


Emma Kitcher, Privacy Nerd
Emma Kitcher, Privacy Nerd

 
 
 

Comments


00011-2939233035.png

DID YOU FIND THIS USEFUL?

Join our mailing list to get practical insights on ISO 27001, AI, and data protection; No fluff, just useful stuff.

You can unsubscribe at any time. You are welcome to read our Privacy Policy

bottom of page