How do you protect against those threats
Lots of different methods. But the big thing is this. Isolation is key. Many Different devices/accounts for different functions etc