A SIMPLE KEY FOR DEVELOPING AND IMPLEMENTING CYBERSECURITY POLICIES UNVEILED