Cyber Security in 2018 What is the first step?