Technology ❯ Information Technology ❯ Data Management
Security Protocols Account Security Identity and Access Management Cybersecurity
Intruders used a subcontractor’s account to view limited records.