Loading: Why Enterprises Should Control Their Encryption Keys