We are solidly in the age of the data breach, and companies are justifiably nervous. But not nearly nervous enough. “As with any security issue, a full review of all companies, systems, third-party applications and related IT solutions must be completed before final determinations can be made.”