Strategies for Effective Cybersecurity