IT protection protocols