The 7 Cyber security Steps to Becoming Hacker-proof