Defense in Depth: Safeguarding Data with an Integrated Approach to Security