i'd like to add:
if you are in a position that enables you access to datasystems that might be abused, make sure to enable yourself some .. lets call it "emergency entrance"
so if the threat actors remove you from your position and shit hits the fan, you will be able to remotely intervene.
you need to prepare now for the action you might need to do later.
they can only use the internet for their crimes if the furries let them. ;)