Cybersecurity

 

Before your team gives a software vendor access to its repository of legal agreements and sensitive business information, that vendor needs to show you their SOC 2 Type II attestation and audit report. And if the vendor doesn't have a SOC 2 Type II report—or, worse, doesn't know what SOC 2 is—that's a huge red flag. Here's why.