The stories of breached data security have become almost too familiar: An employee takes home a laptop against regulations. A hard drive is sent out for repair, but disappears. A disc with sensitive data is stolen from an office. For business owners and managers, the threat is real, and there is a need to protect against such violations of data security.