Watch this video on YouTube
An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?