Why is adding information security as an afterthought dangerous?