You can prevent information leakage by managing the machine.
You can control the use of the machine, as well as prevent machine settings from being changed without authorization.
By setting passwords, you can prevent unauthorized access via the network.
See Security Reference.