Practical Mitigation Strategies for Getting Infront of Advanced Persistent Threats