Title

How to: Protect Sensitive Data Used by Third-party Vendors

Authors

Josh Silver

Source

Mainebiz

Date

10-19-2015

Pages

15

Abstract

The author offers several safeguards businesses should take when outsourcing to third-party vendors, so that information security measures are maximized.

Subjects

Computer security, Management

Full text is not available here. Please contact the Library for a copy of the article.

Share

COinS