Security Masters
A compromised individual could be faced with a very difficult situation in which many things, such as email access are compromised and all your password changes could be countered. And a compromised device such as a computer is not yours anymore until you properly clean OS. This compromise doesn't only occur because of your reckless behavior but also because of the companies that collect data on you. So, do your best to make it difficult for them.