"Controlling how sensitive information is exchanged with third parties, such as clients and suppliers, is, in my experience, an area often overlooked in enterprise security policies." . . . . .