Critical Security Control #3, as proposed by the Center for Internet Security, is called Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. This ...