What security best practices should I follow ?

<<
>>