PROACTIVE CYBERSECURITY CYBERSECURITY STEPS FOR OPTIMUM PROTECTION