This includes using proper authentication and secure connectivity, properly secured workstations and servers, using proper virus protection, and restrictions on the use of programs and services in a manner that may adversely affect the network and other users.