Tech »  Making stolen data worthless: why security must start with the data