PROACTIVE CYBERSECURITY CYBERSECURITY STEPS FOR OPTIMUM SECURITY