We provide best practice guidance for enhancing the security of information technology resources. Included in this section is further information on the importance of backups, encryption, and the secure configuration of desktops, laptops, tablets, and other devices where you store important data. Technical instructions on how to follow best practices is provide in the How-Tos section. It is highly advised that all LSA information assets are maintained with best practices in mind.