Assessing a simplified Information Security approach