Watch this video on YouTube
During a routine security assessment, how should an IT professional assess the security of third-party plugins used in their systems?