At risk from threats in other formats, such as computer viruses or hackers hacking. In addition to the host machine will be damaged. May also affect a customer's machine.
There is a risk of threat in other forms. Such as the infected computer, or hackers drilling system. In addition, the server will be damaged. May also affect the customer's machine.