Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?