Extrapolation and higher-level interpretation of these logs can set off an alarm.Q: What sort of communication should take place within an organization (between IT, management and other departments) to make sure data is being secured?A: a) There should be a top-down approach.