Name three of these practices and explain how your organization meets or falls short on the practices identified

Name three of these practices and explain how your organization meets or falls short on the practices identified

Based on the Greiner (2010) article, in addition to traditional technical security tools, some of the network security best practices are non-technical and relate tophysical security and employees.

Name three of these practices and explain how your organization meets or falls short on the practices identified.