Security procedures should be completed according to the specific operating system and computer manufacturer specifications and include
- keeping the system updated
- installing a security application
- applying safe browsing techniques
- avoiding making personal, private transactions (e.g., shopping, banking) on a public network
- acquiring applications from trusted sources
- checking (periodically) data usage for each application.