g unknown or unverified emails and links), limiting the scope and retention of data, refraining from using default passwords for sensitive information, and limiting the allocation, and carefully monitoring custody of, mobile devices, computers, and storage devices such as USB drives ??? which are often the source of a data breach when they are lost and/or stolen.