Hackers know the typical security implementations of CIOs; therefore a key element of effective IT security is to approach it from a hacker's perspective.