• Four ways to enhance your endpoint security