This paper will present ten days of effective tasks, with a quick task and long term task each day. Each essential security action listed below in the day-by-day tables has three characteristics: 1) Focuses on real threats rather than theoretical threats; 2) Can be implemented quickly and...