Hardware is easy to protect: lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than one place; be transported halfway across the planet in seconds; and be stolen without your knowledge.
Protect Your Macintosh, 1994
Is Your Organization's Cyber Security Aligned with Your Business Goals?