We help to prevent attacks through their expertise and knowledge of databases, networks, hardware, firewalls and encryption. We may also regulate access to computer files, develop firewalls, perform risk assessments and test data processing systems to verify security measures.