which of the following is a best practice for securing your home computer