5 top recommendations for effective threat detection