Technology ❯ Information Technology ❯ Data Management ❯ Data Protection
Intruders used a subcontractor’s account to view limited records.