Home SecurityPhysical Security Information security in a war zone: How the Red Cross protects its data