Information Security and Privacy (Part 2)

Information Security and Privacy (Part 2)

Technology By: Judy Borsher, CPA, MBA, CGMA, CITP, MCT

If one of your security concerns is keeping unauthorized people from opening or modifying individual files, here are several key methods to accomplish file-level security and privacy.

Editor's Note: This is the second part of a three-part series. Read Part 1 and Part 3....