Best practices are proven approaches for creating environments that are both secure and useful. The key to implementing sound security practices is to design them so that they enhance business practices rather than inhibit them. Policies and practices that are too difficult or onerous do not contribute to a secure environment and encourage "cheating," which is to say that people will find ways around perceived obstacles in doing their jobs.
The server and workstation best practices linked here have been designed to enhance security at Texas State. Following them should result in an environment that is infinitely more secure than one that depends solely on the manufacturers' default settings.