•	From the e-Activity, recommend at least three best practices the company you researched could adopt for protecting information vital to its operations. Provide specific examples to support your response.