as should data access capabilities of USB ports on computers within the network user accounts and passwords should also be in place on all the equipment to prevent unauthorised operation of the device should either physical or electronic access to it be gained Software installed on devices should be kept up-to-date and operating systems should be patched to mitigate vulnerabilities