. . "Information such as customer credit card details, financial information, personal details, secret documents, etc. is often stored and accessible on IT systems within a company without any specific measures being taken to secure those systems." . .