Based on the Greiner (2010) article, in addition to traditional technical security tools, some of the network security best practices are non-technical and relate tophysical security and employees.
Name three of these practices and explain how your organization meets or falls short on the practices identified.