Best Practices for Using Square Technology in Cyber Defense