Model a baseline of what standard network conduct looks like and inform security teams on any suspicious traffic that falls outside of that typical range. It's also a good idea to use random passwords with out frequent words, dates, or sequences of numbers in them. This is productive simply because, https://deanlrpsf.izrablog.com/27015581/everything-about-cyber-attack-model