Encryption Technology: Is it Enough to Prevent a Breach?