Cybersecurity best practices for team implementation: A guide