33 min

Episode 293: In 5 Steps: A Security Audit to Protect Vendor Data and Avoid Fraud Putting the AP in hAPpy

    • Management

When was the last time you reviewed your security roles and what access is included? Reduce the potential for fraud by restricting who has access to your vendor data. Why? Because the less non-vendor team members that have access to sensitive data, the less potential for them to be social engineered into giving it away - resulting in fraud. Discover how the vendor team can implement a security audit with minimal IT input - in 5 steps. Keep Listening. Check ...

When was the last time you reviewed your security roles and what access is included? Reduce the potential for fraud by restricting who has access to your vendor data. Why? Because the less non-vendor team members that have access to sensitive data, the less potential for them to be social engineered into giving it away - resulting in fraud. Discover how the vendor team can implement a security audit with minimal IT input - in 5 steps. Keep Listening. Check ...

33 min