Justifying Security Spend, A Response From Nehemiah Security: Part 5