Grant permissions for each user to protect critical data.
-- If you prefer a step-by-step guide, check out this article.