3 Components of a Proactive Security Strategy