What are endpoint security threats, and how can they enter your device?