Put a plan in action to implement some of the techniques you have learned in this book.
Ensure that your security policy addresses data protection.
Evaluate a few critical data stores and ensure the ACLs are appropriate on them. For instance, ensure that you have proper ACLs on any stores for network installations of software.