Watch this video on YouTube
What should be the basis for investments in information security technologies?