Critical Security Control #3, as proposed by the Center for Internet Security, is called Secure Configurations for Hardware and Software on Mobile Devices ... associated programs like Microsoft Office ...
Some results have been hidden because they may be inaccessible to you