To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should recommend: