Steps to Shift to Proactive Cyber Security