This article is the final part of our three-part series. In part two, we provided an overview of the most common and successful cyber-attacks and the vulnerabilities that are being exploited – refer here for part two. This part provides an overview of the most important measures to prevent cybersecurity incidents and how these should be prioritised.