The companies need to ensure that its information is only accessible by the correct applications and users, avoid the possible lose of data trough any channel or media, avoid the installation of malicious or unauthorised programs, and the protection against network risks.