Security overhaul

Security overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaulSecurity overhaul