We’re not the first ones to tell you that hackers are breaching networks to steal data, personal information, and intellectual property, and we won’t be the last. But, we might be the first ones to highlight the involvement that third parties, contractors, and vendors play in the world of data breaches.