Identifying potential risk, response, recovery
The simple solution for this is just to isolate the host that is connected to the internet from the internal networks and then create a demilitarized zone. The first risk mitigation in a file server is to estimate the size of programs, files, and transaction.