ty, is much the same, dependent on the security requirements.
> > > Example:
> > > Security auditors claimed that the marketing product database was not
> > > secure.
> > > They said that it needed to be more secure.
> > > The CEO of the company asked a simple question
e said:
> "Whats the worst that could happen if an outsider gains access to this
> database?"
> Answer: "They might buy one of your products!"
> Lesson learned: Don't waste your time securing data that doesn't need to
> be secured.
>
> So, what a