Yes, I would agree with everything that Colin said. There are high-tech breaches or high-tech attacks, and there are also low-tech attacks. We have a huge bunch of engineers and computer scientists who are constantly protecting our networks from attack, but there's also low tech. For example, the Target breach in the U.S., when the information of 40 million customers was stolen, started with someone getting a job as a caretaker at a Target store so that he could attach some devices at night when no one was looking.
That's a real problem, too, when organized crime is infiltrating call centres and infiltrating stores to try to steal identities. You have to be very vigilant about the high-tech stuff and also very vigilant about the low-tech stuff. Then there are the good old-fashioned con artists, who will call the call centre and pretend to be you or pretend to be me. We have to be vigilant with all that too.
Those are the kinds of areas where we're fighting identity theft every day.