Why Organizations Fail to Secure Third-Party Remote Access
SecureWorld News
JUNE 11, 2020
So they might be designed to provide end-user support. And related to my earlier point about managing vendor users, and not letting your vendor manage their own users for you, we really recommend taking that identification and authentication of vendor users in-house. It needs to be under your control.
Let's personalize your content