A technician has been asked by a manager to recommend a security solution for protecting a computer against spyware. Which security technique should the technician recommend?