Which of the following should be practiced to avoid a security risk?