You are a networking consultant for secure systems solutions (sss).
You are a networking consultant for Secure Systems Solutions (SSS). SSS has a number of clients that need to protect their intellectual property. At a recent staff meeting, you and several SSS consultants expressed concern that many SSS clients were not doing enough to protect their intellectual property from insider theft. Your group decided to host a workshop for clients about insider threats and […]