3 Key Cyber Security Considerations