Be aware of security riscs comming into your system and check the need of them. If not needed, keep them outside your system.