Which of the following is the BEST method to prevent data compromise?