Seven Touchpoints for Complete IT Security