Five steps toward a stronger security posture