Keeping your Third-Party Service Provider in Line

April 8, 2011 No Comments

Wouldn’t it have been prudent on Epsilon’s part to have encrypted email addresses and client names on the off chance that its systems could have been breached? After all, the conventional wisdom among IT security professionals now is that it’s not a question of if your systems will be breached, but when. Perhaps Epsilon, like other third-party service providers, is doing just what’s needed under the law, and it’s the laws that need revision.

Read More…

SECURITY

Leave a Reply

(required)

(required)


ADVERTISEMENT

AnDevCon


American Customer Festival 2016 New York

ITBriefcase Comparison Report

Cyber Security Exchange