How did this happen? The typical home network and the typical corporate network are very different. On a corporate network, your computer is well-protected. Firewall rules and cybersecurity tools block certain types of traffic that is known to be malicious or suspicious, so that if a device becomes infected, the malware is unable to reach a threat actor on the Internet. This is sometimes not the case when an employee takes their work computer outside of the corporate network to work at home. Without the corporate network cybersecurity tools in place, the malware can successfully reach the threat actor, thereby giving them access to your computer and the network on which it is running. These days, that network is likely your home network. Now, your malware-infected “zombie” computer is silently under the control of a threat actor who can see and possibly control your computer and explore your home network.