Greater IT dependence requires heightened cybersecurity protocols