As businesses increasingly work with various types of third parties that process sensitive information and, in some cases, access a company’s networks, there is an inherent risk: these third parties create new avenues of attack against a company’s data, systems, and networks. Covington attorneys David Fagan, Nigel Howard, Kurt Wimmer, and Elizabeth Canter describe these