Security Guidelines

Follow these best practices: