Steps to Effective Security