Including the use of anti-malware and anti-virus software
Two-factor authentication including its purpose and function