Dear @Ian_Atwater,
With the methods as described by @Krunal_Sheth, you will be very well able to avoid unwanted access.