Scott Smeester
//
November 16, 2023
We can find ourselves hostage to a person in IT who alone holds access to key programs and data. How do you prevent such a vulnerability, and what do you do if it’s too late? Here are three practical plans to work through.