A new report stresses the importance of logging, network segmentation and strong authentication, among other practices.