article thumbnail

Why Organizations Fail to Secure Third-Party Remote Access

SecureWorld News

So they might be designed to provide end-user support. And related to my earlier point about managing vendor users, and not letting your vendor manage their own users for you, we really recommend taking that identification and authentication of vendor users in-house. It needs to be under your control.