Organizations are now adopting advanced technology at an exponential pace and this has enabled them to leverage personal information. Most of these technologies extensively use data to deliver multiple services. Although this phenomenon is mostly beneficial, it also makes it very difficult to protect sensitive data. The extensive use of data to drive business has increased the economic value of personal information. This results in every instance ofa data breach turning into a very stressful, expensive, and time consuming affair. This presents organizations with the challenge of coining strategies that derives value from the wealth of personal information at their disposal while protecting personal information from malicious attacks.