Recommendations for setting up security

The following describes logins and how they relate to security.