What are the four key requirements for a robust cybersecurity plan? What is the must-have technology to shore up your IT security?