Hackers can use workforce’ own footprints to breach the network. They will use the personal aspects persons share on social media sites to craft really focused spear phishing and business e mail compromise scams. Even particulars that seem benign, like an staff's cell phone number, can provide hackers a foothold. Some marketing campaigns tend