User accounts and
passwords should also be in place on all the equipment, to
prevent unauthorised operation of the device should either
physical or electronic access to it be gained. Software installed
on devices should be kept up-to-date and operating systems
should be patched to mitigate vulnerabilities.