How the information-centric security approach can protect sensitive company information