• One thing that most all data breaches have in common is that it involves data access patterns that are not typical. The hacker must poke around, exploring for vulnerabilities, and then download protected data in bulk. There are monitoring tools that can help detect and block that type of thing.

    "Do not seek to follow in the footsteps of the wise. Instead, seek what they sought." - Matsuo Basho