Which of the following is a good practice for protecting computing devices ?
i. Finding a central accessible physical space for computers, portable devices, and any removable storage media.
ii. Assuming the purchasing department verified that the commercial vendor anti-virus/anti-spyware and firewall software is installed as appropriate.
iii. Login and screen-saver passwords, or token or biometric mechanisms, are disabled to make it easier to use the device quickly.
iv. Ensuring anti-virus and other software is kept up-to-date. That includes keeping up with patches for the operating system itself, and upgrades to whatever browser and email software is used.