Effective Information Security Starts Here