Use a layered cybersecurity approach to protect crown jewels