Hackers can use staff’ personalized footprints to breach the network. They are able to use the personal information men and women share on social media sites to craft very focused spear phishing and business email compromise scams. Even aspects that appear to be benign, like an personnel's cell phone number, can give hackers a foothold. 물�