Generations ago, documents and prized objects were hidden from the public, secured in the safes of many homes, offices, banks, and institutions. Under close protection, as well as under lock and key, this tangible-data was protected from unauthorized parties through the implementation of time-tested procedures. 

As the world changed and technology improved, the methodology for approaching and securing this data changed as well. In our February 2015 White Paper, Protecting the CIA, we discussed the importance in protecting the...