Our mobile, social, and collaborative lifestyles have transformed the way we use technology at home, at work, and everywhere in between. We want – and need – to secure our devices, personal information, and business data; to keep our families safe online, and our employees productive; to take advantage of all that new technologies can offer us while minimizing the risk.
The security of an enterprise is not only dependent on the organization itself, but also on the security of their IT supply chain and contractors. These represent potential weak points into the security of any organization. Third-party contractors and suppliers have been used to compromise … [read post]