Countering Cyberthreats Using Information Security Policy