6 Best Practices to Up Your Endpoint Protection Game