In parallel, define a security architecture and migrationstrategy that provides security through browsers, Secure Sockets Layer and passwords in the short run, and gets you started on PKI by deploying technologies such as IP Security virtual private networks and the Secure Multi-purpose Internet Mail Extensions e-mail standard.
But changes in the landscape, particularly the migration of readership to tablets and smartphones, mean a strategy that was right for 2008 might not be right anymore.