. . "Also, it is no longer necessary to be concerned about cyber criminals using readily available applications to steal information such as login credentials, financial information, or personally identifiable information." . . .