1.6 The benefits of a security-by-design mindset