Information technology systems are vulnerable to security breaches, particularly when they are accessible via the Internet. If appropriate measures are not in place, unauthorized individuals may access confidential data. Information may be altered, permanently destroyed or used for unsavory purposes.