If your vendor, whether its an supplier or contractor, is connected to your organization’s network, then any security vulnerabilites that they may have will also be inherited to your organizations network. 

In 80 words or more review and discuss the following article 

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *