- • Combine methods!
- • Restrict access
- • Encrypt communications
- • Maintenance (audits, security patches, training, incremental application improvements)
- • Implement data management/consumption protocols
- • Educate data consumers
- • Encrypt the data
- • Render data unreadable (but still useable)
- • Discard data when not needed
- • Distribute information