Which two steps should customers take to evolve to a trust-centric security philosophy? (Choose two.)