The companies need to ensure that its information is only
accessible by the correct applications and users, avoid the
possible lose of data trough any channel or media, avoid the
installation of malicious or unauthorised programs, and the
protection against network risks.