It shouldn't be necessary unless you're planning to reach out to possible malware or infected files from the initial operating system; in that case, securing the second file could help.
It shouldn't be necessary unless you're planning to reach out to possible malware or infected files from the initial operating system; in that case, securing the second file could help.