This is perhaps the 'worst case scenario' outcome from an information leak: 'irreversible damage' that ultimately leads to the organisation closing its doors.

Everyone wants to avoid being the next victim of such an attack, of course, and while we can't pick who chooses to attack our company, we can be better prepared. 

We can determine where our most critical data is held, who has access to it, and model the potential threats to that data. Having done those things, monitoring and response are key activities to safeguard data. 

It's a cliche, but nonetheless true: security is a journey not a destination. 

Constant vigilance is needed to keep both intellectual property and customer data safe. 

This is where we need to make best use of technology to help us achieve our goals. The technology itself is not the silver bullet. 

But technology can help us by automating the tasks that take humans time. And the ones that humans typically grow tired of doing.