Apple, Sony, Yahoo, and numerous other companies have had their systems hacked. Companies are investing heavily into securing their IT infrastructure from attacks.
The question still remains as to how end-users can protect themselves from hackers. End-users deal with confidential data. Consider the following confidential data we use on a daily basis:
Person...



