Security of business information is a top priority. What should businesses do to secure their information assets, optimally utilizing the scarce resources?