Security procedures should be completed according to the specific operating system and computer manufacturer specifications and include
- encrypting network passwords
- turning off broadcasting
- disabling guest networks
- adding media access control (MAC) filtering
- acquiring a network monitoring application (e.g., Fing).