How do we protect our systems from damage because of cyberattacks?