Understanding Business Security Profiles