Log it like you mean it: Best practices for security