The process of securing information takes on many forms. Some forms are proactive and some are reactive. Many methods of securing data and the systems that hold the data can actually be both proactive and reactive. Case in point, the installation of virus scanning software and the updating of virus...