Reading: Strategies to Safeguard Wire Instructions from Cyberattacks