Securing Digital Transformation: How to Close Major Loopholes