Security Best Practices

Please read and follow the following best practices: