Describe four proven data protection strategies a company can use