trust eco system
Trust in humanity, invites Insider Threats.
Trust in humans, invites human errors.
Trust in processes, invites bypass of the process
Trust in automated systems, invites system errors.
Trust in security, invites cyber attacks.
trust but VERIFY
and there is one more thing:
GARBAGE in - garbage out
We can correlate and validate encrypted field values to locate an INTEGRITY BREACH.