What are the primary advantages of IT security policies?