Which of the following best practices should a security manager do to manage the risks of these attack vectors?