Home SecurityNetwork Security Securing the edge: 5 best practices