Limit Vendor Risk – Step 2: Identify and Control Who is Accessing Your Critical Information
In my previous post, I discussed the first of four steps in how you can limit vendor risk. This month we will review maybe the most important of the steps, Step 2: Identify and Control Who is Accessing Your Critical Information. Steps to identify and control who is accessing your critical information: Create an inventory […]