Cybersecurity Part 2: The Upside and the Downside