CYBERSECURITY
One size fits nothing
Identify the assets that are most important, consider the most likely lines of attack, and tailor a defensive strategy accordingly.