A decision that must be made early in the transaction process is how to apply information security practices to transaction communications.  There are a range of options, and in perception (and often in reality) there is a continuum of trade-offs between convenience and security. It is critical that security protocols are openly addressed and consistently…

Read More