The next big step toward securing VUMC data is ensuring that any device (including personal devices) used to access VUMC data is encrypted and secured.