Home Business Cybersecurity II: Putting it back together