I recently read a brief article in SC Magazine written by Thom Langford titled "Working with third-parties: Make security a priority". In it, Thom points out that some of the largest security data breaches thus far are attributed to the poor security at the third party vendors. External parties often help organisations and many of these [...]This post was originally published on Control Original and Replicated Data from Confidential Files on Covertix.- Covertix - Protecting Confidential Information - Anywhere