Tips for Managing Third-Party Risk in Health Care
Reciprocity
SEPTEMBER 30, 2022
Several device manufacturers provide remote support but don’t always follow good cybersecurity hygiene. A common mistake is granting device manufacturers VPN access with open elevated privileges. Does the vendor outsource any IT services to fourth parties that can increase risk exposure?
Let's personalize your content