Follow these best practices to avoid the security holes created by these often-overlooked, but ubiquitous, devices.