Effective protection comes from combining both approaches: aligning IT and business processes and conducting regular system ...