5 Steps to Address Security Risks