The keys to a successful IT security strategy