Carefully consider the drives and directories that are share with other machines. Also, consider the users who have Guest privileges.
Be careful about programs you upload on your server, or those that other people install on your server. Other people’s programs might have security gaps. Someone could upload a malicious program designed specifically to subvert your security. Always examine programs carefully before you allow them on your server.