Data security: traditional methods vs. blockchain – which method is more effective?