How To Tackle Thorny IT Security Issues