Describe four proven data protection strategies a company can use to protect the