$ 0 0 In the second part of his article on how to assess the security of a third-party provider, Ross McKerchar takes a look at security functionality.