A few simple yet apparently often overlooked security measures for equipment that lives on an untrusted network.