First, we have the right people and experience to secure the data. Second, we will rely on current technology to enable against ddos attacks as well as server breaches. We may also consider the utilization and integration of Storj decentralized storage platforms for added barriers against breaches.