Hackers can use workforce’ individual footprints to breach the network. They're able to use the personal details men and women share on social media sites to craft highly targeted spear phishing and business electronic mail compromise scams. Even particulars that appear benign, like an staff's cell phone number, can provide hackers a foothold.