Other protective measures incorporate transforming default usernames and passwords, utilizing multi-variable authentication, putting in a firewall and identifying and preventing suspicious e-mail. Bodily Security for Equipment: Take into consideration how many people with your Office environment leave their desk for meetings, gatherings and lunch breaks. Are they locking their products? https://cdsc.libraries.wsu.edu/scalar/mblog/learn-about-protecting-your-organizations-computer-and-mobile-activities-with-sentrypc