- Verify that all necessary ports are open in the firewall.
 - Create a secure, encrypted user account with a long password.
 - Obtain the appropriate permissions from the system administrator.
 - Train users on the resources they can access, as well as the security protocols to follow.
 
