The True Foundation of Cyber Resilience: Log Collection Best Practices