The security model used by nearly all organizations is so weak that the mere act of creating new data comes with the assumption that such data will become public and subject to theft or misuse. As more people and computers became connected, waves upon waves of cybersecurity solutions and procedures have sprung up to help organizations keep their data out of reach of threats. But despite the layers of security and processes implemented by IT, hackers and unauthorized insiders are still successful. Secure enclave technology implementations are now featured in virtually every server being developed today.
Source: https://www.helpnetsecurity.com/2021/02/04/data-access/