Cybersecurity: how data scrutiny can thwart attacks