Reactive defense doesn't do the job: at the time a business’s data is breached, the task shifts from safety to threat management and damage Management. detailed documentation furnishing all info required on the system and its reason for authorities to evaluate its compliance The jury is still out as to whether these ways supply value for money,