Hackers can use employees’ particular footprints to breach the network. They are able to use the non-public specifics persons share on social media sites to craft extremely targeted spear phishing and business e-mail compromise frauds. Even details that seem benign, like an personnel's cell phone number, can provide hackers a foothold. The ul