Strategies to Counter Cyber Threats