3 Steps to Safeguard Your Enterprise Network: A Guide to Tackling Cyber Vulnerabilities