Spam/Phishing
Mails
On-prem
Cybersecurity
Negligence
Weak Passwords
or Access/Role
Management
Poor user
protocols and
monitoring
Malicious
links/websites/ads