Dealing with Information Security Threats