Three Steps for Protecting Your Data End-to-End