Learn how attackers think — and how to build habits that keep you off the exploit path. Self-custody is only step one.