A cybersecurity leader is considering adopting a third-party managed service to handle sensitive HR data. What is the LEAST important factor to consider when conducting a security assessment of the third-party service?
Data Encryption Mechanisms in Transit and at Rest
Physical Security Measures at the Third-Party Facility
Reputation and Track Record of the Third-Party Provider