Originally posted by JIDEARE
View Post
The ones that do that tend to be a bit more clued in and ensure that the invitation/requirement is for anyone who has access to their sites or their systems, then specifying a list of: employees, temporary staff, contractors, suppliers, ...
Comment