Some people in our company create lists of contacts and then enroll them in workflows. To allow that, we have to give them access to all workflows so they can edit them. This is a high-security risk of them being able to actually change workflo
read more