It is far wiser to do your own installations and ensure that all data flowing through the organization has end-to-end encryption.