
Business partners, outsourcers, service providers or consultants — companies regularly make use of outside resources to handle business functions. In our 24/7, always-online business environment, these outside resources are often granted access to internal IT, whether through minimal access via an externally-available email account, though a vendor portal, or via a VPN tunnel. Such access granted to outsiders effectively extend an organization’s security “attack surface.” How well is that...
READ MORE

