Steps to implementing a Data-Centric Security (DCS) strategy​