Continuing last week’s discussion of basic cyber hygiene, and the “Critical Security ... is called Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers ...