A Trojan Horse of a Different Color: The Inherent Security Risk of Today’s Contingent Workforce

Temps, Contractors, and Consultants – do you know who has access to what within the enterprise?  Can your contingent workers access and share sensitive information? Store data locally on their laptop? Or even retain access through orphaned accounts once they leave? These security gaps represent a ticking time bomb for organizations. In this discussion, we examine the business process challenges and resolution paths associated with the management of contingent workers.