. . . "Among them: implementation of least privilege principle on desktops and servers, secure password stores, and other systems and platforms that are vulnerable to security risks." . .