Which kinds of providers should you seek out and why?<p>How do you secure both the internals and the IO from deliberate or accidental corruption?<p>Talk about what's the most effective!: Network Architectures? Encryption schemes? Applications? Network security appliances? Tazing the everloving sh*t out of people!?(physical security)