. . . "Summary In the two preceding chapters we examined ways in which to keep your data safe, mainly from within an organization." .