Choose one best practices for effective threat management and explain how it is done​