You must ensure that necessary security protections are in place to protect the business data as well as IT systems against various cyber attacks such as DDoS attack, malware attack, ransomware attacks etc. You would also have to ensure that proper threat monitoring, detection and response systems are in place.