How we apply security has to correlate with where we choose to allow electronic information of any value to travel. The term ‘choose to allow’ is used intentionally to indicate that if we have something of value, we need to apply appropriate management and protection.
More than ever, we need to apply data governance, which involves putting appropriate management and control directly over our information, no matter where it is. Of course, we know that all information is not of equal value. There is no point protecting my public author bio pic with the same security I would apply to a finance system.