Don’t Wait for a Breach — Here Are 5 Easy Steps to Fortify Your Cybersecurity