Getting by without E5: IT Security when you can’t have the best toys