Sophistication needed in cyber defence strategies