Ensure that the third party who has developed your key software will continue to support that software, provide updates in a timely manner, and can provide you with source code in the event that the third party can no longer support the application. Source: Recommendations from the Microsoft Security Assessment Tool.  Okay Microsoft, I’ll take […]