Under Lock, Key, And Sensible Practices: Protecting Our Digital Assets