❖ Any information that is stored on or put into the computer
❖ Other devices inside the network
❖ Monitoring a user through webcam and microphone
Stolen information including usernames / passwords and personal data
❖ OS / Service exploitation
Use an up-to-date antivirus and firewall