It is incumbent upon the client to perform a Security Risk Analysis to determine where the gaps are and cure the gaps. Some of these gaps might be tech related and some of them may be administrative related. You can help them with the technology issues after the SRA is complete. The collection finishes with […]