6 Tips to Avoid Incoming Threats to Your Systems