Six Considerations for Strengthening Information Security