Hackers can use workforce’ personal footprints to breach the network. They could use the private aspects people today share on social media sites to craft extremely targeted spear phishing and business email compromise frauds. Even facts that seem to be benign, like an personnel's phone number, can give hackers a foothold. The Lesson: Some ma