Network intrusion happens often enough that they almost certainly weren't after you personally. It's like email spam -- attackers probe thousands of systems hoping to find one easy catch. Did you...
Risk is based on many factors, which include:
Threat
Vulnerability
CriticalityIf I read your post correctly, it sounds like you feel like there is a threat based on your interaction with some...