Implement a network security plan.
Implementation should include explaining and enforcing well-documented use policies that ensure network security, including
- Internet security software
- antivirus or anti-malware software
- protocol control
- network segmentation
- implementation of the principle of least privilege
- acceptable use policies
- access points
- intrusion detection systems (host and network based)
- intrusion protection systems (host and network based).