Summarize two key information security practices you recommend the company implement. Provide supporting examples/research/justification for your two recommended information security practices. Use appropriate terminology learned from the information assurance module.