Clients, vendors, or third-party members may request access to your network, but it just takes one whose personal computer has a virus to compromise security on a much larger scale. Third-party data requests should be part of your security policy, and allowing third-party workers to use your data to help with projects should always take place after the proper security screens. Working with third parties is inevitable, but is also a situation in which the statement that cyber security breaches often have a human-error component is most poignant. While it’s largely impossible to remove all third-party apps from your work flow, note that many apps providing work flow on operating systems, browsers, or email clients often have access to at least some of your information. For a fully-secure environment, work with your IT team to develop in-house work flow solutions.