How would you secure someone else's devices?