By taking sensible precautions to avoid risks such as loss and theft of equipment, insecure wireless hotspots, working on publicly accessible or home computers, weak passwords, and ???social engineering???, it???s perfectly possible for users to work safely and securely.