Restrict, either through uninstalling or disabling, any unauthorized or unnecessary browser or email
client plugins, extensions, and add-on applications.
Personnel must have security guidelines that deal with e.g. the following topics:
The organisation must make sure unnecessary software like application, system utilities and network services are removed.
Only software approved by the organization can be run on the devices. The organization should: