Step 1: The password length Step 2: Managing new users on your system Step 3: Remove remote access from your account