Blake posits that CRM and AMS software can make great targets for hackers: these kinds of software contain targeted contact information. Whether it's true or not, we look at mitigation strategies.