How to: Protect Sensitive Data Used by Third-party Vendors
Date
10-19-2015
Pages
15
Abstract
The author offers several safeguards businesses should take when outsourcing to third-party vendors, so that information security measures are maximized.
Subjects
Computer security, Management
Recommended Citation
Silver, Josh, "How to: Protect Sensitive Data Used by Third-party Vendors" (2015). Maine News Index – MaineBiz. 6515.
https://digitalcommons.portlandlibrary.com/news_mainebiz/6515
COinS
Source
Mainebiz