STEPS TO CHOOSING A GOOD CYBERSECURITY SOFTWARE