What methods do companies take to secure the files?